René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

135 lines
4.5 KiB
JSON

{
"id": "CVE-2003-0013",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-01-17T05:00:00.000",
"lastModified": "2016-10-18T02:28:18.870",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The default .htaccess scripts for Bugzilla 2.14.x before 2.14.5, 2.16.x before 2.16.2, and 2.17.x before 2.17.3 do not include filenames for backup copies of the localconfig file that are made from editors such as vi and Emacs, which could allow remote attackers to obtain a database password by directly accessing the backup file."
},
{
"lang": "es",
"value": "Los scripts .htaccess por defecto en Bugzilla 2.14.x anteriores a 2.14.5, 2.16.x anteriores a 2.16.2, y 2.17.x anteriores a 2.17.3 no bloquean el acceso a copias de seguridad del fichero localconfig que son hechas por editores como vi y Emacs, lo que podr\u00eda permitir a atacantes remotos obtener una contrase\u00f1a de la base de datos accediendo directamente al fichero copia de seguridad."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1883A98C-E595-4F3C-87BF-A63393F9F561"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD49E53A-5676-4FAC-A8A2-30FAC04C33D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1084AF8E-5269-4EFF-BBD2-C5A77945FCF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4B035-B73E-48E9-BBB9-83219F5D2A95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9452C271-2812-4775-8396-394C642EACFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F16D338E-C5BC-46E1-95DD-D9B0E25EE56E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2FC5C7-B218-4B87-9805-F90AC0E7A281"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=104154319200399&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2003/dsa-230",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/10970.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/6501",
"source": "cve@mitre.org"
}
]
}