mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
128 lines
4.4 KiB
JSON
128 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2008-0231",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-01-11T00:46:00.000",
|
|
"lastModified": "2018-10-15T21:58:44.890",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple directory traversal vulnerabilities in index.php in Tuned Studios (1) Subwoofer, (2) Freeze Theme, (3) Orange Cutout, (4) Lonely Maple, (5) Endless, (6) Classic Theme, and (7) Music Theme webpage templates allow remote attackers to include and execute arbitrary files via \"..\" sequences in the page parameter. NOTE: this can be leveraged for remote file inclusion when running in some PHP 5 environments."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de salto de directorio en el archivo index.php en las plantillas de p\u00e1ginas web de Tuned Studios: (1) Subwoofer, (2) Freeze Theme, (3) Orange Cutout, (4) Lonely Maple, (5) Endless, (6) Classic Theme, y (7) Music Theme, permiten a atacantes remotos incluir y ejecutar archivos arbitrarios por medio de secuencias \"..\" en el par\u00e1metro page. NOTA: esto puede ser aprovechado para la inclusi\u00f3n de archivos remota cuando se ejecuta en algunos entornos PHP 5."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tuned_studios:classic_theme:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B039A91A-CD08-4797-BCC8-26CCA314B3FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tuned_studios:endless:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "14A4ADC9-9FF0-4FD8-A0EB-D9A00EC4D489"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tuned_studios:freeze_theme:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "899816A8-C7E8-41E3-B915-6560DFFC8640"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tuned_studios:lonely_maple:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5FD526F0-FA78-45E9-AB9A-8D14B510D204"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tuned_studios:music_theme:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "46B54A5E-D11C-4ACD-AB76-37B7D77B13E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tuned_studios:orange_cutout:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E042281B-A23C-4D1C-8988-08AC480F499F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tuned_studios:subwoofer:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93467A28-7A77-468F-B625-6F6383656728"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/3532",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/485991/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/27196",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39555",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.exploit-db.com/exploits/4876",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |