fkie_cve-2013-0332
Vulnerability from fkie_nvd
Published
2013-03-20 15:55
Modified
2024-11-21 01:47
Severity ?
Summary
Multiple directory traversal vulnerabilities in ZoneMinder 1.24.x before 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) view, (2) request, or (3) action parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoneminder | zoneminder | 1.24.0 | |
zoneminder | zoneminder | 1.24.1 | |
zoneminder | zoneminder | 1.24.2 | |
zoneminder | zoneminder | 1.24.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:1.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13978347-0B65-4FCE-B9B9-F1FA8E34A43A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoneminder:zoneminder:1.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "8793778B-04BE-4585-9BF6-6ACDE046BE9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoneminder:zoneminder:1.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "AAE57765-EBBD-467B-9B79-4AC466AF6963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoneminder:zoneminder:1.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "B5F2F3F0-8C39-49EE-B14E-CC33EE71A81C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in ZoneMinder 1.24.x before 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) view, (2) request, or (3) action parameter." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de salto de directorio en ZoneMinder v1.24.x anterior a v1.24.4 permite a atacantes remotos leer ficheros de su elecci\u00f3n a trav\u00e9s de un .. (punto punto) en los par\u00e1metros (1) \"view\", (2) \"request\", o (3) \"action\"." } ], "id": "CVE-2013-0332", "lastModified": "2024-11-21T01:47:19.463", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-20T15:55:00.937", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700912" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2640" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/02/21/8" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/02/21/9" }, { "source": "secalert@redhat.com", "url": "http://www.zoneminder.com/forums/viewtopic.php?f=1\u0026t=17979" }, { "source": "secalert@redhat.com", "url": "http://www.zoneminder.com/wiki/index.php/Change_History" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2640" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/02/21/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/02/21/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zoneminder.com/forums/viewtopic.php?f=1\u0026t=17979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zoneminder.com/wiki/index.php/Change_History" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.