René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

136 lines
4.7 KiB
JSON

{
"id": "CVE-2008-7050",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-08-24T10:30:02.187",
"lastModified": "2009-08-24T10:30:02.187",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failure occurs, which allows remote attackers to bypass authentication and gain privileges with an arbitrary password."
},
{
"lang": "es",
"value": "La funci\u00f3n password_check en auth/auth_phpbb3.php en WoW Raid Manager v3.5.1 anterior a Patch 1, cuando usando autenticaci\u00f3n PHPBB3, (1) no invoca la funci\u00f3n CheckPassword con los argumentos requeridos, lo que siempre lanza un fallo de autenticaci\u00f3n, y (2) devuelve verdadero en lugar de falso cuando se produce un fallo de autenticaci\u00f3n, lo que permite a los atacantes remotos evitar la autenticaci\u00f3n y ganar privilegios con una contrase\u00f1a arbitraria."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-255"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wowraidmanager:wowraidmanager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.5.1",
"matchCriteriaId": "71959C66-7190-4513-8042-4D8D5A651F53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wowraidmanager:wowraidmanager:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB674C5-D4D4-41CA-BB09-AE6A368B5FB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wowraidmanager:wowraidmanager:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "11AF4B36-D51B-48B4-A613-0CAA5BE17FAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wowraidmanager:wowraidmanager:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "938EEB42-5FEA-4B12-A9E6-B3F53E02DA3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wowraidmanager:wowraidmanager:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3242351A-C53D-4E68-8ACC-3D6FF029D07A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wowraidmanager:wowraidmanager:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E14EC3B-FB10-4C3E-BCF0-09BC3F7ECD53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wowraidmanager:wowraidmanager:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76E94008-29BC-40E8-8058-2172CCAFCD48"
}
]
}
]
}
],
"references": [
{
"url": "http://github.com/Illydth/wowraidmanager/commit/7dd6367ae85003dd5d715431b6ab695f2c2f200a",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/3109",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.wowraidmanager.net/e107_plugins/forum/forum_viewtopic.php?2153",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.wowraidmanager.net/e107_plugins/forum/forum_viewtopic.php?2167",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}