René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.3 KiB
JSON

{
"id": "CVE-2019-9651",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-03-11T01:29:00.327",
"lastModified": "2019-03-11T19:59:26.530",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in SDCMS V1.7. In the \\app\\admin\\controller\\themecontroller.php file, the check_bad() function's filtering is not strict, resulting in PHP code execution. This occurs because some dangerous PHP functions (such as \"eval\") are blocked but others (such as \"system\") are not, and because \".php\" is blocked but \".PHP\" is not blocked."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en SDCMS en su versi\u00f3n V1.7. En el archivo \\app\\admin\\controller\\themecontroller.php, el filtrado de la funci\u00f3n check_bad() no es estricto, lo que resulta en la ejecuci\u00f3n de c\u00f3digo PHP. Esto ocurre porque algunas funciones PHP peligrosas (p.ej., \"eval\") est\u00e1n bloqueadas mientras que otros (p.ej., \"system\") no, y debido a que \".php\" est\u00e1 bloqueado pero \".PHP\" no lo est\u00e1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sdcms:sdcms:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C78F2B-3D8A-441E-8CB8-2EF34446D4DB"
}
]
}
]
}
],
"references": [
{
"url": "http://www.iwantacve.cn/index.php/archives/155/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}