2024-12-08 03:06:42 +00:00

117 lines
3.5 KiB
JSON

{
"id": "CVE-2010-0711",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-02-25T20:30:00.640",
"lastModified": "2024-11-21T01:12:48.067",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in default.asp in ASPCode CMS 1.5.8, 2.0.0 Build 103, and possibly other versions, allows remote attackers to hijack the authentication of an administrator for requests that (1) delete users via the delete action in the ma2 parameter or (2) create administrators via the update action in the ma2 parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados en default.asp en ASPCode CMS v1.5.8, v2.0.0 Build 103 y posiblemente otras versiones, permite a atacantes remotos secuestrar la autenticaci\u00f3n de un administrador para peticiones de (1) borrado de usuarios a trav\u00e9s de la acci\u00f3n \"delete\" en el par\u00e1metro \"ma2\" o (2) crear administradores a trav\u00e9s de la acci\u00f3n \"update\" en el par\u00e1metro \"ma2\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aspcodecms:aspcode_cms:1.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "22874292-8640-413E-8B29-5C16E4E6D7C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aspcodecms:aspcode_cms:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FFBB0F2A-FAF5-4907-B72A-FFFC49B05765"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/62357",
"source": "cve@mitre.org"
},
{
"url": "http://packetstormsecurity.org/1002-exploits/aspcodecms-xssxsrf.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/38596",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/62357",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://packetstormsecurity.org/1002-exploits/aspcodecms-xssxsrf.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/38596",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}