2024-12-08 03:06:42 +00:00

134 lines
4.0 KiB
JSON

{
"id": "CVE-2011-0503",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-01-20T19:00:10.100",
"lastModified": "2024-11-21T01:24:09.677",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in VaM Shop 1.6, 1.6.1, and probably earlier versions allows remote attackers to hijack the authentication of administrators for requests that (1) change user status via admin/customers.php or (2) change user permissions via admin/accounting.php. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en VaM Shop v1.6, v1.6.1 y posiblemente anteriores versiones permite a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para (1) cambiar el estado de usuario mediante admin/customers.php o (2) cambiar permisos de usuario mediante admin/accounting.php. NOTA: algunos de estos detalles son obtenidos de terceros..."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vamsoft:vam_shop:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.6.1",
"matchCriteriaId": "A60D12D4-BA8D-459C-9FFD-756E9FC4E067"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vamsoft:vam_shop:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7313C5D3-2FBD-4DB1-95B1-8C52406E59C2"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/70431",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/42869",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/15968",
"source": "cve@mitre.org"
},
{
"url": "http://www.htbridge.ch/advisory/xsrf_csrf_in_vam_shop.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/515613/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/70431",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/42869",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/15968",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.htbridge.ch/advisory/xsrf_csrf_in_vam_shop.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/515613/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}