mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
232 lines
8.1 KiB
JSON
232 lines
8.1 KiB
JSON
{
|
|
"id": "CVE-2013-5724",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2013-09-12T13:31:18.477",
|
|
"lastModified": "2024-11-21T01:58:01.150",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Phpbb3 before 3.0.11-4 for Debian GNU/Linux uses world-writable permissions for cache files, which allows local users to modify the file contents via standard filesystem write operations."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Phpbb3 anterior a 3.0.11-4 para Debian GNU/Linux usa permisos de escritura global para archivos de cach\u00e9, lo cual permite a un usuario local modificar los contenidos de los archivos a trav\u00e9s de de operaciones de escritura est\u00e1ndar del sistema de archivos.\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 2.1,
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.0.11-3",
|
|
"matchCriteriaId": "875E0BC1-1756-4537-AFE6-9258A020617C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.0-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C4EFC7A-BA10-4B39-A2A5-E49D460F84F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.0-2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "114589ED-3AD2-4FC6-97EB-98ED3BBD69BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.0-b5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "70F79E5B-243D-486F-A7E5-08DEE3EB746B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.0-rc1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "70897C74-6A3A-45B3-8BC3-12E25B2CE040"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.0-rc2-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F9C94CE-EFB4-4BFE-9446-7BCEEDA2338D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.0-rc3-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE3AE2E8-33F2-4FB8-A79F-D5411B7E972D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.0-rc4-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD2E4C48-4AB4-4048-8E1B-2C2D779181CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.0-rc5-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6230764A-7123-41FC-8F69-12E1F6E48019"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.0-rc7-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CBF474A2-CBB1-4CD5-9CFE-AA841BDABF10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.1-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F14D70B-5D69-4A9A-9959-177FB35E8B17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.2-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2A10916-A2DA-4E8A-BD5A-591265ACC240"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.2-2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20EE2A36-C846-4E38-8974-7EE6205394B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.2-3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "129DE3DB-28C4-4692-801D-345EB9DC2DCA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.2-4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F50004C2-3DDA-4D15-BC35-B61EADDED816"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.4-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E25A2E50-0334-45C1-B666-50F0E68783D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.7-p1-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D129DEE3-CE46-46E2-AFD4-3D7FC991BDC6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.7-p1-2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D923E442-F35D-49DE-905A-FB30E45C6324"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.7-p1-3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "851997A3-9F36-435E-AF46-7490E3028303"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.7-p1-4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6BBA5B6D-67F6-42CB-9584-0FF3C15E058F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.7-p1-5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24CD4056-FF91-475B-892D-9144877A24F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.9-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ACD0A660-E4E1-4C27-8AF3-591ED9AB132E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.10-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7BA78BBB-4281-446A-A4F1-08608249A57A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.10-2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B718C136-C456-419D-9E4C-32E1B2933207"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.11-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6CBD5BA8-67EE-4866-B8BA-21E634D8D667"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:debian:phpbb3:3.0.11-2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E96E7F5B-F6FA-4ECF-9F6D-D82D8AF9635E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711172",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/54665",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2013/dsa-2752",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711172",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/54665",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2013/dsa-2752",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |