ID CVE-2008-7102
Type cve
Reporter NVD
Modified 2017-08-16T21:29:49
Description
DotNetNuke 2.0 through 4.8.4 allows remote attackers to load .ascx files instead of skin files, and possibly access privileged functionality, via unknown vectors related to parameter validation.
{"id": "CVE-2008-7102", "bulletinFamily": "NVD", "title": "CVE-2008-7102", "description": "DotNetNuke 2.0 through 4.8.4 allows remote attackers to load .ascx files instead of skin files, and possibly access privileged functionality, via unknown vectors related to parameter validation.", "published": "2009-08-27T16:30:00", "modified": "2017-08-16T21:29:49", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7102", "reporter": "NVD", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/45077", "http://www.dotnetnuke.com/News/SecurityPolicy/Securitybulletinno23/tabid/1176/Default.aspx", "http://www.securityfocus.com/bid/31145"], "cvelist": ["CVE-2008-7102"], "type": "cve", "lastseen": "2017-08-17T11:14:09", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:dotnetnuke:dotnetnuke:4.8.1", "cpe:/a:dotnetnuke:dotnetnuke:4.5.5", "cpe:/a:dotnetnuke:dotnetnuke:3.0.8", "cpe:/a:dotnetnuke:dotnetnuke:4.5.4", "cpe:/a:dotnetnuke:dotnetnuke:3.1.0", "cpe:/a:dotnetnuke:dotnetnuke:4.7.0", "cpe:/a:dotnetnuke:dotnetnuke:4.8.0", "cpe:/a:dotnetnuke:dotnetnuke:4.0", "cpe:/a:dotnetnuke:dotnetnuke:3.0.11", "cpe:/a:dotnetnuke:dotnetnuke:4.6.0", "cpe:/a:dotnetnuke:dotnetnuke:3.3.5", "cpe:/a:dotnetnuke:dotnetnuke:4.4.1", "cpe:/a:dotnetnuke:dotnetnuke:4.3.5", "cpe:/a:dotnetnuke:dotnetnuke:4.6.2", "cpe:/a:dotnetnuke:dotnetnuke:4.8.4", "cpe:/a:dotnetnuke:dotnetnuke:4.8.3", "cpe:/a:dotnetnuke:dotnetnuke:2.1.1", "cpe:/a:dotnetnuke:dotnetnuke:4.8.2", "cpe:/a:dotnetnuke:dotnetnuke:4.6.1", "cpe:/a:dotnetnuke:dotnetnuke:3.0.7", "cpe:/a:dotnetnuke:dotnetnuke:2.1.2", "cpe:/a:dotnetnuke:dotnetnuke:4.5.2"], "cvelist": ["CVE-2008-7102"], "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "DotNetNuke 2.0 through 4.8.4 allows remote attackers to load .ascx files instead of skin files, and possibly access privileged functionality, via unknown vectors related to parameter validation.", "edition": 1, "enchantments": {}, "hash": "b17ddc85548361d430fdd8ae7e3d1db0f94acd3d26de1648116d8c8e743f80c6", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "d12058ec6394f94283a168d61ca67e8e", "key": "description"}, {"hash": "13d8ff43070576ee1c516181e501a867", "key": "references"}, {"hash": "8c7c820545706d011c41991d76f7d2be", "key": "cvelist"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "520a3ddd9cabb58d37b41787ca386adf", "key": "href"}, {"hash": "c5de515f7fa0016934b65472f5402caa", "key": "modified"}, {"hash": "77ae911521c77630a3da31ed2ff63e8e", "key": "title"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "796376b1fd66a92be1275163150bd7cc", "key": "published"}, {"hash": "1009b72a90f89f3ce84c6217be84bd0b", "key": "cpe"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7102", "id": "CVE-2008-7102", "lastseen": "2016-09-03T11:52:55", "modified": "2009-08-28T00:00:00", "objectVersion": "1.2", "published": "2009-08-27T16:30:00", "references": ["http://xforce.iss.net/xforce/xfdb/45077", "http://www.dotnetnuke.com/News/SecurityPolicy/Securitybulletinno23/tabid/1176/Default.aspx", "http://www.securityfocus.com/bid/31145"], "reporter": "NVD", "scanner": [], "title": "CVE-2008-7102", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T11:52:55"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "1009b72a90f89f3ce84c6217be84bd0b"}, {"key": "cvelist", "hash": "8c7c820545706d011c41991d76f7d2be"}, {"key": "cvss", "hash": "e5d275b3ebd62646b78320753699e02e"}, {"key": "description", "hash": "d12058ec6394f94283a168d61ca67e8e"}, {"key": "href", "hash": "520a3ddd9cabb58d37b41787ca386adf"}, {"key": "modified", "hash": "a7df42a62dc4bd40444b6eb188757036"}, {"key": "published", "hash": "796376b1fd66a92be1275163150bd7cc"}, {"key": "references", "hash": "20f260a26f329feafb9fa597dbd66ae9"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "77ae911521c77630a3da31ed2ff63e8e"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "9ce4d0dca11a32342956cb044004949db067d6b5d8656433235a4c7bc9addef1", "viewCount": 0, "enchantments": {"vulnersScore": 5.0}, "objectVersion": "1.3", "cpe": ["cpe:/a:dotnetnuke:dotnetnuke:4.8.1", "cpe:/a:dotnetnuke:dotnetnuke:4.5.5", "cpe:/a:dotnetnuke:dotnetnuke:3.0.8", "cpe:/a:dotnetnuke:dotnetnuke:4.5.4", "cpe:/a:dotnetnuke:dotnetnuke:3.1.0", "cpe:/a:dotnetnuke:dotnetnuke:4.7.0", "cpe:/a:dotnetnuke:dotnetnuke:4.8.0", "cpe:/a:dotnetnuke:dotnetnuke:4.0", "cpe:/a:dotnetnuke:dotnetnuke:3.0.11", "cpe:/a:dotnetnuke:dotnetnuke:4.6.0", "cpe:/a:dotnetnuke:dotnetnuke:3.3.5", "cpe:/a:dotnetnuke:dotnetnuke:4.4.1", "cpe:/a:dotnetnuke:dotnetnuke:4.3.5", "cpe:/a:dotnetnuke:dotnetnuke:4.6.2", "cpe:/a:dotnetnuke:dotnetnuke:4.8.4", "cpe:/a:dotnetnuke:dotnetnuke:4.8.3", "cpe:/a:dotnetnuke:dotnetnuke:2.1.1", "cpe:/a:dotnetnuke:dotnetnuke:4.8.2", "cpe:/a:dotnetnuke:dotnetnuke:4.6.1", "cpe:/a:dotnetnuke:dotnetnuke:3.0.7", "cpe:/a:dotnetnuke:dotnetnuke:2.1.2", "cpe:/a:dotnetnuke:dotnetnuke:4.5.2"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"result": {"openvas": [{"id": "OPENVAS:1361412562310800685", "type": "openvas", "title": "DotNetNuke Skin Files Security Bypass Vulnerability", "description": "The host is installed with DotNetNuke and is prone to security\n bypass vulnerability.", "published": "2009-09-03T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800685", "cvelist": ["CVE-2008-7102"], "lastseen": "2017-07-02T21:14:01"}]}}