mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
156 lines
5.4 KiB
JSON
156 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2010-4507",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2010-12-30T19:00:05.457",
|
|
"lastModified": "2024-11-21T01:21:06.310",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities on the iSpot 2.0.0.0 R1679, and the ClearSpot 2.0.0.0 R1512 and R1786, with firmware 1.9.9.4 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the cmd parameter in an act_cmd_result action to webmain.cgi, (2) enable remote management via an enable_remote_access act_network_set action to webmain.cgi, (3) enable the TELNET service via an ENABLE_TELNET act_set_wimax_etc_config action to webmain.cgi, (4) enable TELNET sessions via a certain act_network_set action to webmain.cgi, or (5) read arbitrary files via the FILE_PATH parameter in an act_file_download action to upgrademain.cgi."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en iSpot v2.0.0.0 R1679, y el ClearSpot v2.0.0.0 R1512 y R1786, con firmware v1.9.9.4, permite a atacantes remotos secuestrar la autenticaci\u00f3n de los usuarios por peticiones que (1) ejecuten comandos de su elecci\u00f3n a trav\u00e9s del par\u00e1metro cmd en una acci\u00f3n act_cmd_result sobre webmain.cgi, (2) permitir la gesti\u00f3n remota a trav\u00e9s de una acci\u00f3n enable_remote_access act_network_set sobre webmain.cgi, (3) permitir el servicio TELNET a trav\u00e9s de una acci\u00f3n ENABLE_TELNET act_set_wimax_etc_config sobre webmain.cgi, (4) disponer sesiones TELNET a trav\u00e9s de ciertas acciones act_network_set sobre webmain.cgi, o (5) leer ficheros de su elecci\u00f3n a trav\u00e9s del par\u00e1metro FILE_PATH en una acci\u00f3n act_file_download sobre upgrademain.cgi."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 9.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:clear:ispot_firmware:1.9.9.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "18AEED9D-F7C0-4C14-BDC7-3E144DEBDB9F"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:clear:ispot:2.0.0.0:r1679:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC710D6D-20E9-469B-A3D5-E5942D7FE299"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:clear:clearspot_firmware:1.9.9.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "70383CFF-6605-47D5-B7DC-8BB172185C7B"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:clear:clearspot:2.0.0.0:r1512:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D1B3013-ACA9-4976-BF2A-65B1FB2817AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:clear:clearspot:2.0.0.0:r1786:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E7E21CE-F424-4A9B-A9F7-99A85D34B76C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/42590",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/15728/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-008.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42590",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/15728/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-008.txt",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
}
|
|
]
|
|
} |