Show plain JSON{"id": "CVE-2008-6036", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2009-02-03T11:30:00.593", "references": [{"url": "http://secunia.com/advisories/31947", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/31330", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2008/2653", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45337", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/6533", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/31947", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/31330", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2008/2653", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45337", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/6533", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-94"}]}], "descriptions": [{"lang": "en", "value": "PHP remote file inclusion vulnerability in main.inc.php in BaseBuilder 2.0.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the mj_config[src_path] parameter."}, {"lang": "es", "value": "Vulnerabilidad de inclusi\u00f3n remota de archivos PHP en main.inc.php en BaseBuilder v2.0.1 y anteriores permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de una direccion URL en el par\u00e1metro \"mj_config[src_path]\"."}], "lastModified": "2024-11-21T00:55:30.783", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:basebuilder:basebuilder:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51CDA702-D235-4802-8638-D8A366302B4B", "versionEndIncluding": "2.0.1"}, {"criteria": "cpe:2.3:a:basebuilder:basebuilder:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2C18FC7-5183-437D-A160-84265D57A564"}, {"criteria": "cpe:2.3:a:basebuilder:basebuilder:1.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B5CEA2B-B603-42F8-B983-C5B827C86DC5"}, {"criteria": "cpe:2.3:a:basebuilder:basebuilder:1.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3FB618B-462B-43E5-9271-871E78210A62"}, {"criteria": "cpe:2.3:a:basebuilder:basebuilder:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFD08F66-D9AB-427E-9CE0-C01CAC9838F0"}, {"criteria": "cpe:2.3:a:basebuilder:basebuilder:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C43BEC12-136F-4074-B9EF-E0E1146D3516"}, {"criteria": "cpe:2.3:a:basebuilder:basebuilder:2.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41CFA8C7-B840-4112-BD57-81C6C3DC0153"}, {"criteria": "cpe:2.3:a:basebuilder:basebuilder:2.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42B97562-3B81-4867-8EA1-3CA1A68111D6"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}