René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

99 lines
3.0 KiB
JSON

{
"id": "CVE-2011-4801",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-12-14T00:55:02.620",
"lastModified": "2013-08-18T06:24:00.267",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in akeyActivationLogin.do in Authenex Web Management Control in Authenex Strong Authentication System (ASAS) Server 3.1.0.2 and 3.1.0.3 allows remote attackers to execute arbitrary SQL commands via the username parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en akeyActivationLogin.do en Authenex Web Management Control in Authenex Strong Authentication System (ASAS) Server v3.1.0.2 y v3.1.0.3 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro username"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:authenex:authenex_strong_authentication_system_server:3.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "83ADC61E-8408-4977-B56E-451ED1A970D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:authenex:authenex_strong_authentication_system_server:3.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2952CD6C-D3A0-4E13-9C5E-3EF268D5AFDA"
}
]
}
]
}
],
"references": [
{
"url": "http://www.exploit-db.com/exploits/18117",
"source": "cve@mitre.org"
},
{
"url": "http://www.foregroundsecurity.com/security-advisories/101-authenex-a-keyasas-web-management-control-3102-time-based-sql-injection",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://support.authenex.com/index.php?/Knowledgebase/Article/View/124/0/asas3103update2",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}