mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
261 lines
9.5 KiB
JSON
261 lines
9.5 KiB
JSON
{
|
|
"id": "CVE-2008-4358",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-09-30T18:15:08.890",
|
|
"lastModified": "2017-08-08T01:32:35.013",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in class/theme.class.php in SPAW Editor PHP Edition before 2.0.8.1 has unknown impact and attack vectors, probably related to directory traversal sequences in the theme name."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad sin especificar en class/theme.class.php en SPAW Editor PHP Edition 2.0.8.1 tiene un impacto y vectores de ataque desconocidos, probablemente relacionados con las secuencias transversales de salto de directorio en el nombre \"theme\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.0.8",
|
|
"matchCriteriaId": "6F544164-4510-46D3-AAD3-1E6F06E1D7D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0971506E-CA54-4A9A-826D-BD367C19A2DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16AE05A7-82E0-4320-9B13-0EC04C1D73F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3BE436B-CC61-4037-BD27-9E393DDE19A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7CC7F0EF-5C67-4AF1-B837-055E4DA349F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD7DB482-8D93-4FD6-BAE0-81D484843E30"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2375362-A03D-4E87-914C-F8B5EDBCD1C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66A3ED26-3B53-4886-8FCA-4B05C0064A4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01252EAC-AE95-4ED3-A6F2-AEDFBC352B07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.5a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9314F2C-43CF-488E-8F80-1E665B1E62CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDD4E921-D01F-4165-99FA-F921C63374E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5CB28C8A-DED5-4FCC-AF7D-3B63AD5CF8A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "235D1152-F7AD-493B-8407-524B04DFEF9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.1:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8357ADA5-9E54-43E1-AD2E-BC8CBE49A888"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.1:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58BE8F2D-0DEE-4326-91B6-030EC143A8C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8BA3521-7A6F-44FA-88A7-70E950700DF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2471F346-CB24-48A9-A692-022563B0F107"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2:beta_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11C4D204-F801-493C-B560-3E66460A6BF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3F9CB96-13CE-4A80-B056-F8C941A02976"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C6C619F-EF81-415B-9B55-4D5D418DEFA9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37842F25-59E4-42A0-B8B7-65118FB6F05C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B46B16C9-0723-488D-AFB9-5FCCBA23CFA4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.0:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E73FC77A-9256-4AED-A346-78D232260124"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.0:rc:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8970BBD-46B2-411B-975E-FFA535FC513D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89D8AABC-9FB3-4C7C-93B6-915B5BF71E1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F94244D-6AD4-4770-B498-0636E359435E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F23EA6FD-6951-4413-B747-96EA469825DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C46F19C-2DE3-4C40-9F28-0B7D1C6C44B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D57B47C9-61D5-437F-8DFE-8875341AB960"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.5:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9C33FA9-84B7-45D4-A5B1-127D34C28408"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E1554C2-AF1C-4451-8F70-98917D2A5492"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "579C4163-F550-40D7-9561-449971D0E6B0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://blog.solmetra.com/2008/09/10/spaw-editor-php-edition-hotfix-release/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=625333&group_id=77954",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://spaw.svn.sourceforge.net/viewvc/spaw/spaw2/trunk/class/theme.class.php?r1=151&r2=359",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/31185",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45104",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |