René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

123 lines
4.0 KiB
JSON

{
"id": "CVE-2008-4319",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-09-29T19:25:35.760",
"lastModified": "2017-09-29T01:32:06.257",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "fileadmin.php in Libra File Manager (aka Libra PHP File Manager) 1.18 and earlier allows remote attackers to bypass authentication, and read arbitrary files, modify arbitrary files, and list arbitrary directories, by inserting certain user and isadmin parameters in the query string."
},
{
"lang": "es",
"value": "El m\u00f3dulo fileadmin.php en Libra File Manager (tambi\u00e9n conocido como Libra PHP File Manager) v1.18 y anteriores permite a atacantes remotos evitar la autenticaci\u00f3n, leer ficheros arbitrarios, modificar ficheros arbitrarios y listar el contenido de directorios arbitrarios, al insertar ciertos par\u00e1metros \"user\" e \"isadmin\" en la cadena de consulta."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 6.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libra_file_manager:php_filemanager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.18",
"matchCriteriaId": "93AF7428-B3B2-4962-A3EC-7417FCF22B60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libra_file_manager:php_filemanager:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9C83A5C9-A836-4B7F-A0E0-4C354525A08A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libra_file_manager:php_filemanager:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "BB9543DA-0F76-4438-BE61-51D42412A813"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libra_file_manager:php_filemanager:1.05:*:*:*:*:*:*:*",
"matchCriteriaId": "8A152A89-1E0A-47A3-AABD-C5FBC4869EDD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libra_file_manager:php_filemanager:1.08:*:*:*:*:*:*:*",
"matchCriteriaId": "6D225985-9697-4704-AA54-1A9B9D7B8988"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libra_file_manager:php_filemanager:1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "4DFE7EF9-9374-4DF3-9851-E830D424A7AF"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/496742",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/31415",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45423",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/6567",
"source": "cve@mitre.org"
}
]
}