mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
267 lines
9.5 KiB
JSON
267 lines
9.5 KiB
JSON
{
|
|
"id": "CVE-2009-2449",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-07-13T17:30:00.313",
|
|
"lastModified": "2024-11-21T01:04:53.960",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Directory traversal vulnerability in maillinglist/admin/change_config.php in ADbNewsSender before 1.5.6 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the path_to_lang parameter."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de salto de directorio en maillinglist/admin/change_config.php en ADbNewsSender anterior a v1.5.6, permite a atacantes remotos a\u00f1adir y ejecutar archivos locales de su elecci\u00f3n a trav\u00e9s de ..(punto punto) en el par\u00e1metro \"path_to_lang\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 7.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.5.5",
|
|
"matchCriteriaId": "5B412BB4-3E28-4678-9C3F-D2CB22D5E038"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F792DDE-D025-4F5B-AB1A-620A59900857"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A53D1A3-6A37-417B-8CF4-F5897635E774"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "815153B5-F97A-4C56-8C20-4F6E7C0D638A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F051AB9-C299-4E9B-B4C2-EF77A0AE18E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C15AFACD-D8AD-415E-B050-7DAFC99506F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0CEF5136-210C-446B-9E32-6299B10CB69B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D524626-B977-4356-A93F-88B435CFCA90"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "328B133E-7482-4946-BAB1-5D89C60041B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91A71223-CD88-446F-AF93-0626B39BE3EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80953021-E692-449B-A961-A369E8BB4A3C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "683CA1FD-A4E4-41E4-97A1-01A77B520991"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1831F536-F07D-49E8-A863-FDAD8E383104"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD13616B-33A3-4E43-BB91-19E192FA67F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A250D35-B8DF-4999-997C-EC69AD725E36"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4A87D52-68B5-488E-BA5E-FDF61C798195"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8DDB844-AC56-443A-9099-DA0D54F070E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A8E8417-9BFE-4CB2-A218-458CD718F41B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01092A5C-0F07-488B-9F02-ACCA96618BD2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5AF12021-D316-4A18-B3E1-ED6AB9736EB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1758BFA0-47BA-49DB-8477-2996D6D03A72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD0EEF2A-61CC-472C-BE91-7199318DA51B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5CAD3C9-3D51-4DAA-930E-B9ECCDBAB6C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04F1B990-05DE-43FD-8923-CD2E675DE9F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0ECEF6BB-AF11-4427-B740-DC66AEA94DB7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5B3BA36-997A-4CAF-9103-966881BDFC87"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E6AD1EB-77AD-4F2F-A604-C290274C9AB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04E5BC91-05F3-4E97-B47B-C0D4E620F22B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AC95ACF-C82C-445F-AFB5-BE778EC3C3BF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/35845",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/apps/mantisbt/adbnewssender/view.php?id=22",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=694644",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/35596",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/35845",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/apps/mantisbt/adbnewssender/view.php?id=22",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=694644",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/35596",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
}
|
|
]
|
|
} |