mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
206 lines
6.4 KiB
JSON
206 lines
6.4 KiB
JSON
{
|
|
"id": "CVE-2009-2658",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-08-04T16:30:00.420",
|
|
"lastModified": "2024-11-21T01:05:25.280",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Directory traversal vulnerability in ZNC before 0.072 allows remote attackers to overwrite arbitrary files via a crafted DCC SEND request."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de salto de directorio en ZNC anterior a v0.072 permite a atacantes remotos sobrescribir ficheros de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n DCC SEND manipulada."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 7.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.044:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0C012D55-9039-4D68-9CA0-5624ADEF583F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.045:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0C185E34-735D-4839-8C05-B46CE7028765"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.047:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60AEE9F9-78B7-40B4-B28A-1B8F068CA953"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.052:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AECFB9F-9630-438F-9BE4-E4A44A5023FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.054:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA564C01-2757-479C-9E33-2D7F0890C61C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.056:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BFE27D3-487B-41A2-A6CE-AA36E07506BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.058:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13E7CC41-1923-4295-8AFC-8D295FDD9C5D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.060:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C2127D9-936F-4E71-BB78-02DE61FF44C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.062:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89151E35-63D2-440E-AD2F-A2BAECA6884B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.064:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "952BC3B5-4D07-4C61-B3FE-650FBC699B8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.066:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9983141A-3B1F-41EE-809A-0F435EC067C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.068:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A505A45-4404-4E0E-97AD-69D9C5D280DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:znc:znc:0.070:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8AB8B51F-4FD7-463B-9E8B-6846E7E690A5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://en.znc.in/w/index.php?title=ZNC&oldid=3209#WARNING",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://en.znc.in/wiki/ChangeLog/0.072",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/35916",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2009/dsa-1848",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2009/07/21/5",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://znc.svn.sourceforge.net/viewvc/znc?view=rev&sortby=rev&sortdir=down&revision=1570",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00965.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://en.znc.in/w/index.php?title=ZNC&oldid=3209#WARNING",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://en.znc.in/wiki/ChangeLog/0.072",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/35916",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2009/dsa-1848",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2009/07/21/5",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://znc.svn.sourceforge.net/viewvc/znc?view=rev&sortby=rev&sortdir=down&revision=1570",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00965.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |