mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
300 lines
12 KiB
JSON
300 lines
12 KiB
JSON
{
|
|
"id": "CVE-2014-1206",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2014-01-15T16:08:18.580",
|
|
"lastModified": "2018-10-09T19:42:22.627",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "SQL injection vulnerability in the password reset page in Open Web Analytics (OWA) before 1.5.5 allows remote attackers to execute arbitrary SQL commands via the owa_email_address parameter in a base.passwordResetRequest action to index.php."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de inyecci\u00f3n SQL en la p\u00e1gina de reseteo de password de Open Web Analytics (OWA) anteriores a 1.5.5 permite a atacantes remotos ejecutar comandos SQL de forma arbitraria a trav\u00e9s del par\u00e1metro owa_email_address en una acci\u00f3n base.passwordResetRequest en index.php."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.5.4",
|
|
"matchCriteriaId": "C5A2E7D7-0441-4181-934A-61C85AC46B26"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3FA1232F-39EF-484F-9D26-8BB475502BAF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9BBD26AC-FDC7-4975-9C60-25B2697B48A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D535F257-B30A-4FDC-9AE7-AC6A485C787B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87F7951F-8765-4483-94CB-C1716D311B04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8CCBCBA7-57EE-4032-B51B-5D9E16E9113D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16BB3521-7D77-4845-900D-0C11B6F7A691"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CB90903F-B3B6-4804-8008-BAE7C14B6A12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2868DA9F-76D7-4A6F-97D5-D4CDB563F850"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D638AB9B-5872-4201-B269-0E4E9E387020"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.1.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2CB3E0E0-74E9-4654-B8C9-E1F1E7B91C5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.1.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94142965-9AB0-4D09-BD4C-0F0418CA1825"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.1.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1003183A-A393-4815-9934-6DEC5F23D857"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.1.0:rc4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD725504-B359-4C93-88E9-D2CB96E4EFB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13229169-37DE-4C0E-8D8F-9F22D8B56BC2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76D627EB-DC2F-4666-AFEE-9528D0EBC600"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8357C090-C3ED-456C-B82B-958A374D3574"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F307A6C-FA18-469D-ADD9-8F2E9768E03A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A8C8FDD-6145-4253-87CD-B5E0FD2052D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07FAE334-9266-4C10-B1F7-1E70F40B11C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.1:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "824C0DA9-1FFE-42C9-8AEB-BC94989ED0BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA9906BA-F6CF-4D5A-A4EB-5A67808DF0AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "00490E69-AB5A-4C79-889F-372C91F59EF2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01C62DCC-F712-416A-A169-C15EF957CF35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4EAF00F-79B7-4D4D-8B7D-7430B20931EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.3.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D37E3D74-B876-4841-8945-C21BEA0E4BB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09296649-7E7D-4CC2-8902-ACA9C16C2865"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B0838206-8282-4CD5-AD9D-C56D1220B8C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.4.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6AC1D42-B5AE-4BFD-BB05-816C07B5852D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.4.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "016E1B4D-D65C-48D8-853A-69484AFFFB7C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.4.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE6A767E-FC32-473C-AABA-0E49AF133623"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.4.0:rc4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "794B440C-A3FC-4267-86CE-779F566ADBAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0F8970A-E4C6-46AF-BFD2-DCEEBF591AD4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7E5B04E-566B-4F4C-954B-4BA92529AAAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.5.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ADB023FC-C55C-46D9-B9BF-3AF720AFA483"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.5.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8FF068B-6502-426F-8E07-BBC0A6D19410"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.5.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC2DCB56-0914-4CDA-9B17-7E0D66B3BA32"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06E645A9-8E83-49B6-8275-5C7D1AE3C453"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6913C56E-8B0D-42D4-977C-FA4D318C6FCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openwebanalytics:open_web_analytics:1.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1AA2EC3C-197B-4314-96C3-3857E9DE401D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://wiki.openwebanalytics.com/index.php?title=1.5.5",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/31738",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.secureworks.com/advisories/SWRX-2014-001/SWRX-2014-001.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/531105/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/64774",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
}
|
|
]
|
|
} |