mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
179 lines
7.0 KiB
JSON
179 lines
7.0 KiB
JSON
{
|
|
"id": "CVE-2017-14993",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2018-02-20T23:29:00.307",
|
|
"lastModified": "2019-10-03T00:03:26.223",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "OXID eShop Community Edition before 6.0.0 RC3 (development), 4.10.x before 4.10.6 (maintenance), and 4.9.x before 4.9.11 (legacy), Enterprise Edition before 6.0.0 RC3 (development), 5.2.x before 5.2.11 (legacy), and 5.3.x before 5.3.6 (maintenance), and Professional Edition before 6.0.0 RC3 (development), 4.9.x before 4.9.11 (legacy) and 4.10.x before 4.10.6 (maintenance) allow remote attackers to crawl specially crafted URLs (aka \"forced browsing\") in order to overflow the database of the shop and consequently make it stop working. Prerequisite: the shop allows rendering empty categories to the storefront via an admin option."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "OXID eShop Community Edition en versiones anteriores a la 6.0.0 RC3 (development), 4.10.x anteriores a la 4.10.6 (maintenance) y versiones 4.9.x anteriores a la 04/09/2011 (legacy); Enterprise Edition en versiones anteriores a la 6.0.0 RC3 (development), versiones 5.2.x anteriores a la 05/02/2011 (legacy) y versiones 5.3.x anteriores a la 5.3.6 (maintenance) y Professional Edition en versiones anteriores a la 6.0.0 RC3 (development), versiones 4.9.x anteriores a la 04/09/2011 (legacy) y 4.10.x anteriores a la 4.10.6 (maintenance) permiten que atacantes remotos rastreen URL especialmente manipuladas (\"navegaci\u00f3n forzada\") para desbordar la base de datos de la tienda y hacer que deje de funcionar. Prerrequisito: la tienda permite mostrar las categor\u00edas vac\u00edas en la vista principal mediante una opci\u00f3n de administrador."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-425"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:community:*:*:*",
|
|
"versionStartIncluding": "4.9.0",
|
|
"versionEndExcluding": "4.9.11",
|
|
"matchCriteriaId": "E272C8A6-A5B7-4C04-8F14-B374857A3263"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:professional:*:*:*",
|
|
"versionStartIncluding": "4.9.0",
|
|
"versionEndExcluding": "4.9.11",
|
|
"matchCriteriaId": "E5D4F566-3F07-4D92-8C3E-FC4DDF5BF976"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:community:*:*:*",
|
|
"versionStartIncluding": "4.10.0",
|
|
"versionEndExcluding": "4.10.6",
|
|
"matchCriteriaId": "DF8C0A78-24C1-4751-9B5B-8D4980351DD2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:professional:*:*:*",
|
|
"versionStartIncluding": "4.10.0",
|
|
"versionEndExcluding": "4.10.6",
|
|
"matchCriteriaId": "710F4268-7682-429B-ADB3-99008B38FD49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:enterprise:*:*:*",
|
|
"versionStartIncluding": "5.2.0",
|
|
"versionEndExcluding": "5.2.11",
|
|
"matchCriteriaId": "CF6863A0-FED8-4092-89AA-0AE5F169F80A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:*:*:*:*:enterprise:*:*:*",
|
|
"versionStartIncluding": "5.3.0",
|
|
"versionEndExcluding": "5.3.6",
|
|
"matchCriteriaId": "240BEC7B-F5EC-4761-9133-19EB4AC8238A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:6.0.0:rc1:*:*:community:*:*:*",
|
|
"matchCriteriaId": "B70B24C9-3B67-4577-B91E-DEA55FDBA401"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:6.0.0:rc1:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "A019B397-0B3D-4BC2-BD89-D704718D9ED0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:6.0.0:rc1:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "913BA158-23AE-4129-9533-0091496460B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:6.0.0:rc2:*:*:community:*:*:*",
|
|
"matchCriteriaId": "4339F463-2EF8-4072-8E06-51A865AE78C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:6.0.0:rc2:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "D361898B-F113-4D5E-8ABD-ACCE5DF36FEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxid-esales:eshop:6.0.0:rc2:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "91E65058-886F-4E13-97B8-711804F95F5B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://bugs.oxid-esales.com/view.php?id=6678",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://oxidforge.org/en/security-bulletin-2017-002.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |