Show plain JSON{"id": "CVE-2018-18572", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}]}, "published": "2019-08-22T15:15:11.967", "references": [{"url": "https://github.com/osCommerce/oscommerce2/issues/631", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/osCommerce/oscommerce2/issues/631", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-434"}]}], "descriptions": [{"lang": "en", "value": "osCommerce 2.3.4.1 has an incomplete '.htaccess' for blacklist filtering in the \"product\" page. Because of this filter, script files with certain PHP-related extensions (such as .phtml and .php5) didn't execute in the application. But this filter didn't prevent the '.pht' extension. Thus, remote authenticated administrators can upload '.pht' files for arbitrary PHP code execution via a /catalog/admin/categories.php?cPath=&action=new_product URI."}, {"lang": "es", "value": "osCommerce 2.3.4.1 tiene un '.htaccess' incompleto para el filtrado de listas negras en la p\u00e1gina \"producto\". Debido a este filtro, los archivos de script con ciertas extensiones relacionadas con PHP (como .phtml y .php5) no se ejecutaron en la aplicaci\u00f3n. Pero este filtro no impidi\u00f3 la extensi\u00f3n '.pht'. Por lo tanto, los administradores autenticados remotos pueden cargar archivos '.pht' para la ejecuci\u00f3n arbitraria de c\u00f3digo PHP a trav\u00e9s de n /catalog/admin/categories.php?cPath=&action=new_product URI."}], "lastModified": "2024-11-21T03:56:11.130", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:oscommerce:oscommerce:2.3.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D8A496B-7F43-478C-8A75-C3CF3688067C"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}