fkie_cve-2009-3654
Vulnerability from fkie_nvd
Published
2009-10-09 14:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Boost before 6.x-1.03, a module for Drupal, allows remote attackers to create new webroot directories via unknown attack vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| 316solutions | boost | * | |
| 316solutions | boost | 6.x-1.0 | |
| 316solutions | boost | 6.x-1.0 | |
| 316solutions | boost | 6.x-1.0-alpha1 | |
| 316solutions | boost | 6.x-1.0-alpha2 | |
| 316solutions | boost | 6.x-1.0-alpha3 | |
| 316solutions | boost | 6.x-1.0-alpha4 | |
| 316solutions | boost | 6.x-1.0-beta1 | |
| 316solutions | boost | 6.x-1.0-beta2 | |
| 316solutions | boost | 6.x-1.0-rc1 | |
| 316solutions | boost | 6.x-1.0-rc2 | |
| 316solutions | boost | 6.x-1.0-rc3 | |
| 316solutions | boost | 6.x-1.0-rc4 | |
| 316solutions | boost | 6.x-1.0-rc5 | |
| 316solutions | boost | 6.x-1.x-dev | |
| drupal | drupal | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:316solutions:boost:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C776FC76-983B-417E-8D2D-9C6030EB828B",
"versionEndIncluding": "6.x-1.01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "499F1230-CC5E-4E7C-97DB-5A86D2EB201E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "E733ACBC-95F7-4A9A-B5F6-A2C130FB393E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-alpha1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCB8ED0-136E-4A8C-9BD5-56AF647C4255",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-alpha2:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC5F2A5-2B28-4568-938B-9F45A65D2090",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-alpha3:*:*:*:*:*:*:*",
"matchCriteriaId": "6028B533-8FEE-480F-A085-C9A378CF192E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-alpha4:*:*:*:*:*:*:*",
"matchCriteriaId": "6A56D7F3-D21D-44E7-A199-67F62ECABD52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-beta1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4004B5C-1535-4D09-AB6F-10594705A841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-beta2:*:*:*:*:*:*:*",
"matchCriteriaId": "2E1B5166-B9DF-4084-8177-3EC5FFC53E8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "E97250B2-5A19-43D0-9480-5DC81CB167F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "215CBCF7-243E-4D42-BB4F-095A0D1C8C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc3:*:*:*:*:*:*:*",
"matchCriteriaId": "11099A30-D191-4031-88D5-5EBB5F8D8263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc4:*:*:*:*:*:*:*",
"matchCriteriaId": "6F0E5BED-0B3F-4BEB-A64E-679C0B8577B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5DA28CF-0CC8-4D1E-8E6A-F3798C4688AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:316solutions:boost:6.x-1.x-dev:*:*:*:*:*:*:*",
"matchCriteriaId": "A83E0181-627C-41B6-8819-95DF2E066355",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Boost before 6.x-1.03, a module for Drupal, allows remote attackers to create new webroot directories via unknown attack vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el m\u00f3dulo de Drupal \"Boost\" antes de v6.x-1.03, permite a atacantes remotos para crear directorios webroot nuevos a trav\u00e9s de vectores de ataque desconocidos."
}
],
"id": "CVE-2009-3654",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-10-09T14:30:00.577",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://drupal.org/node/592470"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/592490"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/58424"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36925"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/36561"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53553"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://drupal.org/node/592470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/592490"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/58424"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36925"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/36561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53553"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…