2024-07-14 02:06:08 +00:00

112 lines
3.6 KiB
JSON

{
"id": "CVE-2009-0729",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-02-24T23:30:03.827",
"lastModified": "2017-08-17T01:29:59.897",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple directory traversal vulnerabilities in Page Engine CMS 2.0 Basic and Pro allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the fPrefix parameter to (1) modules/recent_poll_include.php, (2) modules/login_include.php, and (3) modules/statistics_include.php and (4) configuration.inc.php in includes/. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de salto de directorio en Page Engine CMS v2.0 Basic y Pro, permite a atacantes remotos incluir y ejecutar archivos locales de su elecci\u00f3n a trav\u00e9s de secuencias de salto de directorio en el par\u00e1metro \"fPrefix\" a (1) modules/recent_poll_include.php, (2) modules/login_include.php, (3) modules/statistics_include.php y (4) configuration.inc.php in includes/. NOTA: el origen de esta informaci\u00f3n es desconocido. Los detalles han sido obtenidos a partir de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lingx:page_engine_cms:2.0:-:basic:*:*:*:*:*",
"matchCriteriaId": "BA8D0B15-AA9F-446E-99E7-29B37B34FB5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lingx:page_engine_cms:2.0:-:pro:*:*:*:*:*",
"matchCriteriaId": "E2065EC2-EEE9-4DF7-AAEF-A8328A96C8A2"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/52175",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/52176",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/52177",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/52178",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/33983",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33860",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48856",
"source": "cve@mitre.org"
}
]
}