René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

102 lines
3.1 KiB
JSON

{
"id": "CVE-2008-2044",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-05-01T19:05:00.000",
"lastModified": "2018-10-11T20:38:52.547",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "includes/library.php in netOffice Dwins 1.3 p2 compares the demoSession variable to the 'true' string literal instead of the true boolean literal, which allows remote attackers to bypass authentication and execute arbitrary code by setting this variable to 1, as demonstrated by uploading a PHP script via an add action to projects_site/uploadfile.php."
},
{
"lang": "es",
"value": "includes/library.php en netOffice Dwins 1.3 p2 compara la variable demoSession con la cadena literal \"true\" en lugar de compararla con el valor l\u00f3gico true, lo que permite a los atacantes remotos saltarse la autenticaci\u00f3n y ejecutar c\u00f3digo arbitrario fijando el valor de la variable a 1, como se demuestra subiendo un script PHP a trav\u00e9s de la acci\u00f3n add a projects_site/iploadfile.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netoffice:dwins:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "034660B1-1064-4657-A421-7BF4734A573A"
}
]
}
]
}
],
"references": [
{
"url": "http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3845",
"source": "cve@mitre.org"
},
{
"url": "http://sourceforge.net/forum/forum.php?forum_id=814851",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/488958",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/491542/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/28051",
"source": "cve@mitre.org"
}
]
}