fkie_cve-2009-3654
Vulnerability from fkie_nvd
Published
2009-10-09 14:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Boost before 6.x-1.03, a module for Drupal, allows remote attackers to create new webroot directories via unknown attack vectors.
Impacted products
Vendor Product Version
316solutions boost *
316solutions boost 6.x-1.0
316solutions boost 6.x-1.0
316solutions boost 6.x-1.0-alpha1
316solutions boost 6.x-1.0-alpha2
316solutions boost 6.x-1.0-alpha3
316solutions boost 6.x-1.0-alpha4
316solutions boost 6.x-1.0-beta1
316solutions boost 6.x-1.0-beta2
316solutions boost 6.x-1.0-rc1
316solutions boost 6.x-1.0-rc2
316solutions boost 6.x-1.0-rc3
316solutions boost 6.x-1.0-rc4
316solutions boost 6.x-1.0-rc5
316solutions boost 6.x-1.x-dev
drupal drupal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:316solutions:boost:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C776FC76-983B-417E-8D2D-9C6030EB828B",
              "versionEndIncluding": "6.x-1.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "499F1230-CC5E-4E7C-97DB-5A86D2EB201E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "E733ACBC-95F7-4A9A-B5F6-A2C130FB393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-alpha1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCB8ED0-136E-4A8C-9BD5-56AF647C4255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-alpha2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BC5F2A5-2B28-4568-938B-9F45A65D2090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-alpha3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6028B533-8FEE-480F-A085-C9A378CF192E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-alpha4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A56D7F3-D21D-44E7-A199-67F62ECABD52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4004B5C-1535-4D09-AB6F-10594705A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E1B5166-B9DF-4084-8177-3EC5FFC53E8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E97250B2-5A19-43D0-9480-5DC81CB167F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "215CBCF7-243E-4D42-BB4F-095A0D1C8C58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "11099A30-D191-4031-88D5-5EBB5F8D8263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0E5BED-0B3F-4BEB-A64E-679C0B8577B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.0-rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5DA28CF-0CC8-4D1E-8E6A-F3798C4688AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:316solutions:boost:6.x-1.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83E0181-627C-41B6-8819-95DF2E066355",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Boost before 6.x-1.03, a module for Drupal, allows remote attackers to create new webroot directories via unknown attack vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el m\u00f3dulo de Drupal \"Boost\" antes de v6.x-1.03, permite a atacantes remotos para crear directorios webroot nuevos a trav\u00e9s de vectores de ataque desconocidos."
    }
  ],
  "id": "CVE-2009-3654",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-10-09T14:30:00.577",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://drupal.org/node/592470"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/592490"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/58424"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36925"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/36561"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://drupal.org/node/592470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/592490"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/58424"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36925"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36561"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53553"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…