Lucene search

K
cve[email protected]CVE-2010-1916
HistoryMay 12, 2010 - 11:46 a.m.

CVE-2010-1916

2010-05-1211:46:40
CWE-264
web.nvd.nist.gov
25
cve-2010-1916
xinha wysiwyg editor
remote attack
access restrictions
plugin configuration
arbitrary files
imagemanager plugin

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.3 High

AI Score

Confidence

Low

0.02 Low

EPSS

Percentile

89.0%

The dynamic configuration feature in Xinha WYSIWYG editor 0.96 Beta 2 and earlier, as used in Serendipity 1.5.2 and earlier, allows remote attackers to bypass intended access restrictions and modify the configuration of arbitrary plugins via (1) crafted backend_config_secret_key_location and backend_config_hash parameters that are used in a SHA1 hash of a shared secret that can be known or externally influenced, which are not properly handled by the “Deprecated config passing” feature; or (2) crafted backend_data and backend_data[key_location] variables, which are not properly handled by the xinha_read_passed_data function. NOTE: this can be leveraged to upload and possibly execute arbitrary files via config.inc.php in the ImageManager plugin.

Affected configurations

NVD
Node
xinhawysiwyg_editorMatch0.9beta
OR
xinhawysiwyg_editorMatch0.91beta
OR
xinhawysiwyg_editorMatch0.92beta
OR
xinhawysiwyg_editorMatch0.93
OR
xinhawysiwyg_editorMatch0.94
OR
xinhawysiwyg_editorMatch0.95
OR
xinhawysiwyg_editorMatch0.96beta
OR
xinhawysiwyg_editorMatch0.96beta2
AND
s9yserendipityMatch0.3
OR
s9yserendipityMatch0.4
OR
s9yserendipityMatch0.5pl1
OR
s9yserendipityMatch0.6pl3
OR
s9yserendipityMatch0.7
OR
s9yserendipityMatch0.7.1
OR
s9yserendipityMatch0.8
OR
s9yserendipityMatch0.8.1
OR
s9yserendipityMatch0.8.2
OR
s9yserendipityMatch0.8.3
OR
s9yserendipityMatch0.8.4
OR
s9yserendipityMatch0.8.5
OR
s9yserendipityMatch0.9
OR
s9yserendipityMatch0.9.1
OR
s9yserendipityMatch1.0
OR
s9yserendipityMatch1.0.1
OR
s9yserendipityMatch1.0.2
OR
s9yserendipityMatch1.0.3
OR
s9yserendipityMatch1.0.4
OR
s9yserendipityMatch1.1
OR
s9yserendipityMatch1.1.1
OR
s9yserendipityMatch1.1.2
OR
s9yserendipityMatch1.1.3
OR
s9yserendipityMatch1.1.4
OR
s9yserendipityMatch1.2
OR
s9yserendipityMatch1.2.1
OR
s9yserendipityMatch1.3
OR
s9yserendipityMatch1.3.1
OR
s9yserendipityMatch1.4
OR
s9yserendipityMatch1.4.1
OR
s9yserendipityMatch1.5
OR
s9yserendipityMatch1.5.1
OR
s9yserendipityMatch1.5.2

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.3 High

AI Score

Confidence

Low

0.02 Low

EPSS

Percentile

89.0%