Search criteria
27 vulnerabilities found for cakephp by cakephp
FKIE_CVE-2023-22727
Vulnerability from fkie_nvd - Published: 2023-01-17 21:15 - Updated: 2024-11-21 07:45
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
CakePHP is a development framework for PHP web apps. In affected versions the `Cake\Database\Query::limit()` and `Cake\Database\Query::offset()` methods are vulnerable to SQL injection if passed un-sanitized user request data. This issue has been fixed in 4.2.12, 4.3.11, 4.4.10. Users are advised to upgrade. Users unable to upgrade may mitigate this issue by using CakePHP's Pagination library. Manually validating or casting parameters to these methods will also mitigate the issue.
References
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html | Release Notes, Vendor Advisory | |
| security-advisories@github.com | https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239 | Patch, Third Party Advisory | |
| security-advisories@github.com | https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54CC7CDF-D3A7-427B-B734-89E0E47778C7",
"versionEndExcluding": "4.2.12",
"versionStartIncluding": "4.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09F4E6E5-91F9-4496-88A1-2B9DCC6D9656",
"versionEndExcluding": "4.3.11",
"versionStartIncluding": "4.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45326B61-AA4E-4D7C-8B29-ACE4AA9951E5",
"versionEndExcluding": "4.4.10",
"versionStartIncluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CakePHP is a development framework for PHP web apps. In affected versions the `Cake\\Database\\Query::limit()` and `Cake\\Database\\Query::offset()` methods are vulnerable to SQL injection if passed un-sanitized user request data. This issue has been fixed in 4.2.12, 4.3.11, 4.4.10. Users are advised to upgrade. Users unable to upgrade may mitigate this issue by using CakePHP\u0027s Pagination library. Manually validating or casting parameters to these methods will also mitigate the issue."
},
{
"lang": "es",
"value": "CakePHP es un framework de desarrollo para aplicaciones web PHP. En las versiones afectadas, los m\u00e9todos `Cake\\Database\\Query::limit()` y `Cake\\Database\\Query::offset()` son vulnerables a la inyecci\u00f3n SQL si se pasan datos de solicitud de usuario sin desinfectar. Este problema se solucion\u00f3 en 4.2.12, 4.3.11, 4.4.10. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden mitigar este problema utilizando la librer\u00eda de paginaci\u00f3n de CakePHP. La validaci\u00f3n manual o la conversi\u00f3n de par\u00e1metros a estos m\u00e9todos tambi\u00e9n mitigar\u00e1 el problema."
}
],
"id": "CVE-2023-22727",
"lastModified": "2024-11-21T07:45:18.273",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-01-17T21:15:16.550",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2020-35239
Vulnerability from fkie_nvd - Published: 2021-01-26 18:15 - Updated: 2025-01-15 17:44
Severity ?
Summary
A vulnerability exists in CakePHP versions 4.0.x through 4.1.3. The CsrfProtectionMiddleware component allows method override parameters to bypass CSRF checks by changing the HTTP request method to an arbitrary string that is not in the list of request methods that CakePHP checks. Additionally, the route middleware does not verify that this overriden method (which can be an arbitrary string) is actually an HTTP method.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF4FCD2-A500-4A1E-A3DB-E32A25B9B27B",
"versionEndIncluding": "4.1.3",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in CakePHP versions 4.0.x through 4.1.3. The CsrfProtectionMiddleware component allows method override parameters to bypass CSRF checks by changing the HTTP request method to an arbitrary string that is not in the list of request methods that CakePHP checks. Additionally, the route middleware does not verify that this overriden method (which can be an arbitrary string) is actually an HTTP method."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad en CakePHP versiones 4.0.x hasta 4.1.3.\u0026#xa0;El componente CsrfProtectionMiddleware permite que los par\u00e1metros de anulaci\u00f3n de m\u00e9todos omitan las comprobaciones CSRF mediante el cambio del m\u00e9todo de petici\u00f3n HTTP para una cadena arbitraria que no est\u00e1 en la lista de m\u00e9todos de petici\u00f3n que CakePHP comprueba.\u0026#xa0;Adem\u00e1s, el middleware de ruta no verifica que este m\u00e9todo se haya anulado (que puede ser una cadena arbitraria) sea en realidad un m\u00e9todo HTTP"
}
],
"id": "CVE-2020-35239",
"lastModified": "2025-01-15T17:44:05.873",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-26T18:15:53.583",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-11458
Vulnerability from fkie_nvd - Published: 2019-05-08 18:29 - Updated: 2025-01-15 17:44
Severity ?
Summary
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "871E7DDB-C8C3-410D-9E90-6A004B851CFF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en SmtpTransport en CakePHP 3.7.6. Un objeto no serializado con propiedades internas modificadas puede desencadenar una sobrescritura arbitraria de archivos tras su destrucci\u00f3n."
}
],
"id": "CVE-2019-11458",
"lastModified": "2025-01-15T17:44:05.873",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-05-08T18:29:00.453",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/commits/master"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/releases"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/commits/master"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/cakephp/cakephp/releases"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2016-4793
Vulnerability from fkie_nvd - Published: 2017-01-23 21:59 - Updated: 2025-04-20 01:37
Severity ?
Summary
The clientIp function in CakePHP 3.2.4 and earlier allows remote attackers to spoof their IP via the CLIENT-IP HTTP header.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE339E2D-F566-4CA1-AB8B-357163490B17",
"versionEndIncluding": "3.2.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The clientIp function in CakePHP 3.2.4 and earlier allows remote attackers to spoof their IP via the CLIENT-IP HTTP header."
},
{
"lang": "es",
"value": "La funci\u00f3n clientIp en CakePHP 3.2.4 y versiones anteriores, permite a atacantes remotos suplantar su IP a trav\u00e9s del encabezado HTTP CLIENT-IP."
}
],
"id": "CVE-2016-4793",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-01-23T21:59:01.580",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/95846"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html"
},
{
"source": "cve@mitre.org",
"url": "https://support.citrix.com/article/CTX236992"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.exploit-db.com/exploits/39813/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/95846"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.citrix.com/article/CTX236992"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.exploit-db.com/exploits/39813/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-8379
Vulnerability from fkie_nvd - Published: 2016-01-26 19:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
CakePHP 2.x and 3.x before 3.1.5 might allow remote attackers to bypass the CSRF protection mechanism via the _method parameter.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F638D606-0F5E-40A0-BD06-96DC7C1D4DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "16B03062-512E-4159-A5ED-C7B1C21467E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "75E8CA54-F6BD-40CC-8F01-3F43BB80A4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "D565A178-E6E9-47EF-B775-6BE04360DD81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "19C16212-1893-4F12-A65F-81D261A02F46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D52088FC-FE25-4AF4-A1F7-4B2BA35FD7EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1DAA7679-E6E7-4DC5-B54D-7A35E3AB7B30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1888183D-0E4B-4749-8D4D-9F3AEDEED2E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "81EEF2F4-CED0-42E0-9736-9836024550E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F04278B3-68E2-4C2B-B4F2-77F9DFBD5C3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "184E2232-EE6B-4E31-8D40-22ACE9A93748",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FCCAE9-C943-4B94-B77E-217E7D841829",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CD1EE771-655A-478C-BE02-C2C47B5740B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4476046-B076-4269-94FC-F5E2BAD83694",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.1.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "354EA8E8-AE17-4ED5-9EA0-E47800D99AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.1.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "468CAAA0-52B7-4B91-B68D-C9BEF44C28EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B0E45789-4F00-4220-BB94-A2A99EF84D83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF2DC4ED-2100-41E1-9B55-732B892ECFB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61F737FE-F0D9-44F3-BB85-6CBC55B8E3C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "094B2678-A851-4654-BC21-4555DB7BC8D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D9EAB542-8174-422D-896E-6BA66A66757A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7A20F1C5-D73B-4A42-B8E9-B371BB0C62EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28051A8A-6CE2-410A-8145-671FB5735D0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "494FB851-78F0-4DC3-B599-843A4070B562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FCD6F669-68D6-4D7F-AD11-E7B092F4F5A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3F340CD7-04DF-4AA0-B6C0-8145D0DAFF94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DE834442-33B8-4D88-8872-A969D04EA14D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9B34CD8D-B3F8-4173-A79D-2D41D1A9B70C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B776D3-416B-4AE0-AA90-5EE3C63281D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9946147-C15D-4F2A-AC68-C75E5F628D1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9022EAD3-44F1-4F8B-A00F-960BE851C17A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4063A934-EA27-4697-A6A0-1E538C9F427F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EE2DFAB3-130F-4FA3-823F-A4BBCA076AB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC5195-3A19-4772-9782-94F1F041403C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7E9763F3-7981-47AD-946C-4FEAB32CC866",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6B1B1708-501A-4389-A5C4-9A4CB20A52F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "1E81260A-9814-4C6F-B6D3-CBDF22A616A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "02A0145B-BECD-4FBB-AC02-BF15A2A602FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "07AA82B9-87DF-4120-8398-BEF248342E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0457A403-56C4-42ED-8020-FB7A4EC5D31A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC45DCB1-6A3D-460D-96AB-DE8E1CF6DA6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "659BF0E6-279A-4412-9E8E-9732D21E4272",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3A64D83E-78EF-4E76-B451-1C2F8FDDC595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AB0A5FF3-578B-458B-B1A3-3BB5D560E1AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "169A5E41-16BA-4AB3-A924-17002EB5F2DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "519D4568-3E01-4367-82A2-7D3A2F6B7120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5999E469-8353-45EC-83BB-9856EB1CD854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "53638C66-9ADC-493B-8A84-98E6494CBCBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C654EFB9-73BB-4599-8198-AC89D7F384B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CCEAAD5C-B7BB-4826-8218-FBC085F95AD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "B9828C30-DF41-4122-B254-2CF77C73FB0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BA078C0B-205E-4158-B5D5-DB958E66A313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "52F66C4B-68CC-440C-ADF0-9F5103331189",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E1334BA-B2B3-4009-96D8-58CBE728EADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "66C0875D-27E8-40A6-8CD2-319D8FE315F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "74C49797-706A-41E9-ACAE-FA2898C38D3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65E9CA42-32A4-41D7-9721-5EB28BDB6C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A695A4AE-9654-44B9-B5CD-3CC76C94D0B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF53CA3-14F9-4DF9-AB9B-83E43CC37FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF91446-2A40-4F18-A91D-A0704BBCEF01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D50F88-29D6-4F7A-8D4F-90945D9C44FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ABADCE68-3FB2-4101-96BF-219FD08A4C95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAF7339-D727-40D0-AA42-3F45DB24E8DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D768B67D-95E6-4EE8-B153-CD0C1DAD1B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "528DF04B-F200-4FA8-800E-56CB9F4A9E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "80AAF2B6-7D36-4FFE-8E76-8E438134D386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C2AFEB08-D13C-432F-B076-4845C7660CF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D32365A-D3B6-43A7-82AE-083770F8C55A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "23B090B7-F36F-4DE1-A8F5-F96F4FAEDC0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7F685889-E68D-4914-9081-634C1444EF06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73C40C45-7B46-4823-8EC2-BA20D69BFC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2ECF4DB4-41B4-4B2C-A908-2E4DF2BC0AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CC30D573-A40D-4547-A859-835EF786CF3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D92BA30-6D87-498E-A5CA-A61B793185B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6A4BF3D9-51B5-4490-A914-D386A3061C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "65F218EC-15FB-4CDC-8087-773B739EA2D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "39B06F7D-9272-4E53-9029-C9C8EE133D02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "59F06C87-1201-4224-8384-09804633D8D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D8A99084-E883-4F4B-B1AD-2571B368BADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "64BB6194-501E-4F15-8729-8C47BC4A965B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E27044FD-3D2B-481E-B63A-6400ACC116EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "63637E39-5200-49BB-8748-E3DA361D0FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "733683C8-4B3D-4F14-8AD0-06428361B023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0C6A6C1E-5C7C-4114-85DA-2BF8842E9F0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "375C38AC-18BA-44B9-BDA7-9E6A2B5CBFEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8D400763-B615-44CC-8D16-877D7A944BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADAD764-E93B-40CB-85DB-6E869E01FF28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "61DD9349-3928-4FC8-8DC1-00775188DDC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F3DA7D91-6ADE-4A4E-BA6C-F3EE64DADEC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD48718-9816-4B86-981E-A3EC4BD8377B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F2E76CB1-8F33-46A0-8A53-417287D0E676",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65FC9F46-A23B-4766-A338-110B655011BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0377D2CA-DD5F-4DF2-B19A-E014CB66DF3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FDD65C18-6FAF-4801-BA9B-CCD2EF80D55E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE7433E-0976-4CFF-A047-DF0BEC907BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A819659C-DB2A-484C-BE19-8137A76AAD3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4E049C6C-A06F-4C66-B676-B55FE14818C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "498D512A-F571-4BAE-9725-A2DCB05010B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A9E32507-BF0F-464D-B73C-942F7B016D8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD6EA6F-1310-4E20-91AF-CBF8C198398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE29B56-C7C8-4175-B056-BE379D7DE507",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "70A20E6C-2524-41B5-8D2F-A28DB2616A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:2.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B4B5A134-B9B6-4CD5-B283-11EF89A0FE94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA441DC-E34C-4BE7-830C-03B081201884",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "AE18AC01-998B-4221-8BD2-4D9F3316088E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "73EEB2A2-D106-44A3-A4EB-E1C6B4E9964F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "88A76BF8-C95A-4AA9-8553-3660A778C509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "52BC63B9-C4EC-4F76-9C1C-EB05E7B08D4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "824613CB-7CD7-4D62-9168-D8FD1B14D1C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:dev1:*:*:*:*:*:*",
"matchCriteriaId": "45341B4D-E8D1-4174-B8FD-62084A6A617A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:dev2:*:*:*:*:*:*",
"matchCriteriaId": "4E5F6E95-08B5-4DDD-8B03-1C493AC50140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:dev3:*:*:*:*:*:*",
"matchCriteriaId": "9B120889-BD3B-49D4-B521-1FEAB53901C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F0224F74-C696-4C33-AA19-52B6D2ACB4BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E45A1BA5-79A1-4F54-A955-7FA952721EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54D04CE6-306D-4407-B9B9-1DBB802FA433",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2AEC6ADE-F8D2-40CB-94BB-1C6A91F56D75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CD5352-8CAF-48F8-AE5C-69EC9A08E278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7C99BED2-436C-433D-B307-008F81C9FFA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4456F843-0D8A-416F-B4A1-AA562F41F70E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B36AB35D-4472-4B3E-95D2-EC1CD6FDA4D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8E5888B3-89B6-41A5-AD2D-07F5CD88F2B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "17BFA0AE-E0F4-4E88-95CF-D9091E729939",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFFD30A-193F-4157-BE5B-9FBBABB4B1EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5E47041A-5493-4C3B-BFD4-C005F66D9CDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "37053366-ECB2-4600-B2E1-ACB7C0DB759A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "29794FAB-131A-4B88-9DB2-42EE3DDDC550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "7370EA37-B29E-4BC1-B06B-B1F439DD4D63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4E389743-168C-4777-A26D-3466441944D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "57766F28-DB73-4FF4-9D8D-8BA4DC6D8E1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0896BD8D-41F9-4494-90AD-B58015AE819F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.1.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "B740A99F-426D-4F0A-A6DF-3E6BEFAA430F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.1.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "37A53DE4-DCF1-4067-B345-DC3FB79E6BDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "15616929-C9D4-41B9-9552-F943011A7CF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE7FF5F-EB72-40CA-8F45-CE2280F0D4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EA27742D-19AB-4984-9FBE-58B6B5DB5139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27CB3837-7516-4801-AA7F-131743CCE8C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA6BD63-790C-477A-A37D-17746E21C9CF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CakePHP 2.x and 3.x before 3.1.5 might allow remote attackers to bypass the CSRF protection mechanism via the _method parameter."
},
{
"lang": "es",
"value": "CakePHP 2.x y 3.x en versiones anteriores a 3.1.5 podr\u00eda permitir a atacantes remotos eludir los mecanismos de protecci\u00f3n CSRF a trav\u00e9s del par\u00e1metro _method."
}
],
"id": "CVE-2015-8379",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-01-26T19:59:01.140",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://karmainsecurity.com/KIS-2016-01"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2016/Jan/42"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/537317/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://karmainsecurity.com/KIS-2016-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2016/Jan/42"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/537317/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3712
Vulnerability from fkie_nvd - Published: 2011-09-23 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by dispatcher.php and certain other files.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "55580430-660A-4EBB-A7DC-229C5A83DB0D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by dispatcher.php and certain other files."
},
{
"lang": "es",
"value": "CakePHP v1.3.7 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una petici\u00f3n directa a un archivo .php, lo que revela la ruta de instalaci\u00f3n en un mensaje de error, como se demostr\u00f3 con dispatcher.php y algunos otros archivos."
}
],
"id": "CVE-2011-3712",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-09-23T23:55:02.427",
"references": [
{
"source": "cve@mitre.org",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-4335
Vulnerability from fkie_nvd - Published: 2011-01-14 23:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cakefoundation | cakephp | 1.3.0 | |
| cakephp | cakephp | 1.2.8 | |
| cakephp | cakephp | 1.3 | |
| cakephp | cakephp | 1.3.0 | |
| cakephp | cakephp | 1.3.0 | |
| cakephp | cakephp | 1.3.0 | |
| cakephp | cakephp | 1.3.0 | |
| cakephp | cakephp | 1.3.0 | |
| cakephp | cakephp | 1.3.0 | |
| cakephp | cakephp | 1.3.1 | |
| cakephp | cakephp | 1.3.2 | |
| cakephp | cakephp | 1.3.3 | |
| cakephp | cakephp | 1.3.4 | |
| cakephp | cakephp | 1.3.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C65627A5-D154-48F5-8902-D66899ABC206",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6A584BF0-397D-44C7-9F81-CC23EFBAA70B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "7A61C888-8403-4C49-A2A9-8B4AB28518D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "9003AC05-6B40-4362-B808-B05FFF4E7BB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "DDCBE15B-B9CD-462A-9A60-A67B298B6416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4520A728-DD2E-4FFA-8AA7-1A411336C7FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E1537D8B-9A98-4825-9A2D-1834B01C3E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "33E9CE1A-7B0E-4171-A525-820378DDB9AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "40A4B932-BC79-4EBD-8582-3F35BCE566FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3914F5C9-25F0-4204-A817-5192326B37E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C75332-BD3C-477E-9FEA-4BF1273DA0C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D94386AB-8C14-492A-9E67-C827E21440B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C66D697F-CEE2-43C9-B292-359CD77EC775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFC5BFAB-16F9-4B80-9BF0-31DE89FD3985",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files."
},
{
"lang": "es",
"value": "la funci\u00f3n _validatePost en libs/controller/components/security.php en CakePHP v1.3.x hasta la v1.3.5 y v1.2.8 permite a atacantes remotos modificar la cach\u00e9 interna de la aplicaci\u00f3n y ejecutar c\u00f3digo arbitrario a trav\u00e9s de un valor data[_token][fields] debiadamente modificado, el cual es procesado por la funci\u00f3n unserialize, como se ha demostrado mediante la modificaci\u00f3n de la cach\u00e9 file_map para ejecutar archivos locales."
}
],
"id": "CVE-2010-4335",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-01-14T23:00:46.850",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://malloc.im/CakePHP-unserialize.txt"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/42211"
},
{
"source": "secalert@redhat.com",
"url": "http://securityreason.com/securityalert/8026"
},
{
"source": "secalert@redhat.com",
"url": "http://www.exploit-db.com/exploits/16011"
},
{
"source": "secalert@redhat.com",
"url": "http://www.osvdb.org/69352"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://malloc.im/CakePHP-unserialize.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/42211"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/8026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.exploit-db.com/exploits/16011"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/69352"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-5031
Vulnerability from fkie_nvd - Published: 2006-09-27 23:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, followed by a filename ending with "%00" and a .js filename.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16A9857D-C37F-4C46-AD2C-F5D53AA064C8",
"versionEndIncluding": "1.1.7.3363",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, followed by a filename ending with \"%00\" and a .js filename."
},
{
"lang": "es",
"value": "Vulnerabilidad de atravesamiento de directorios en app/webroot/js/vendors.php en Cake Software Foundation CakePHP anterior a 1.1.8.3544 permite a un atacante remoto leer archivos de su elecci\u00f3n a trav\u00e9s de la secuencia ..(punto punto) en el par\u00e1metro file, seguido de un nombre de fichero finalizado con \"%00\" y un nombre de archivo .js."
}
],
"id": "CVE-2006-5031",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-09-27T23:07:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://cakeforge.org/frs/shownotes.php?release_id=134"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/22040"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/20150"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://cakeforge.org/frs/shownotes.php?release_id=134"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/22040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/20150"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29115"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-4067
Vulnerability from fkie_nvd - Published: 2006-08-10 00:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 ("Not Found") error page. NOTE: some of these details are obtained from third party information.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30454E01-9D6C-4967-8BA5-7158697811EE",
"versionEndIncluding": "1.1.6.3264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.0.1.2708:*:*:*:*:*:*:*",
"matchCriteriaId": "C81096BF-7B70-4453-8A50-9DDC28996E0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.1.3.2967:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA3A5E7-413C-4900-9C8D-AA5625BAA3BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.1.4.3104:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6CB5D7-C53F-40AD-BDB5-A890ED6305F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cakephp:cakephp:1.1.5.3148:*:*:*:*:*:*:*",
"matchCriteriaId": "A4A86480-42D7-42D6-B320-61CC37069B67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 (\"Not Found\") error page. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en cake/libs/error.php en CakePHP anterior a 1.1.7.3363 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de la URL, lo cual se refleja en una p\u00e1gina de error 404 (\"no encontrado\"). NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros."
}
],
"id": "CVE-2006-4067",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2006-08-10T00:04:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=124"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21383"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/19372"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/3172"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28256"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21383"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/19372"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/3172"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28256"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-22727 (GCVE-0-2023-22727)
Vulnerability from cvelistv5 – Published: 2023-01-17 20:41 – Updated: 2025-03-10 21:22
VLAI?
Title
Database Query::offset() and limit() vulnerable to SQL injection in cakephp
Summary
CakePHP is a development framework for PHP web apps. In affected versions the `Cake\Database\Query::limit()` and `Cake\Database\Query::offset()` methods are vulnerable to SQL injection if passed un-sanitized user request data. This issue has been fixed in 4.2.12, 4.3.11, 4.4.10. Users are advised to upgrade. Users unable to upgrade may mitigate this issue by using CakePHP's Pagination library. Manually validating or casting parameters to these methods will also mitigate the issue.
Severity ?
9.8 (Critical)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:13:50.233Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp"
},
{
"name": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239"
},
{
"name": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22727",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T20:59:15.575626Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-10T21:22:35.657Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "cakephp",
"vendor": "cakephp",
"versions": [
{
"status": "affected",
"version": "\u003e= 4.2.0, \u003c 4.2.12"
},
{
"status": "affected",
"version": "\u003e= 4.3.0, \u003c 4.3.11"
},
{
"status": "affected",
"version": "\u003e= 4.4.0, \u003c 4.4.10"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "CakePHP is a development framework for PHP web apps. In affected versions the `Cake\\Database\\Query::limit()` and `Cake\\Database\\Query::offset()` methods are vulnerable to SQL injection if passed un-sanitized user request data. This issue has been fixed in 4.2.12, 4.3.11, 4.4.10. Users are advised to upgrade. Users unable to upgrade may mitigate this issue by using CakePHP\u0027s Pagination library. Manually validating or casting parameters to these methods will also mitigate the issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-17T20:41:10.143Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp"
},
{
"name": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239"
},
{
"name": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html",
"tags": [
"x_refsource_MISC"
],
"url": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html"
}
],
"source": {
"advisory": "GHSA-6g8q-qfpv-57wp",
"discovery": "UNKNOWN"
},
"title": "Database Query::offset() and limit() vulnerable to SQL injection in cakephp"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-22727",
"datePublished": "2023-01-17T20:41:10.143Z",
"dateReserved": "2023-01-06T14:21:05.890Z",
"dateUpdated": "2025-03-10T21:22:35.657Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-35239 (GCVE-0-2020-35239)
Vulnerability from cvelistv5 – Published: 2021-01-20 23:37 – Updated: 2024-08-04 17:02
VLAI?
Summary
A vulnerability exists in CakePHP versions 4.0.x through 4.1.3. The CsrfProtectionMiddleware component allows method override parameters to bypass CSRF checks by changing the HTTP request method to an arbitrary string that is not in the list of request methods that CakePHP checks. Additionally, the route middleware does not verify that this overriden method (which can be an arbitrary string) is actually an HTTP method.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:02:07.018Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in CakePHP versions 4.0.x through 4.1.3. The CsrfProtectionMiddleware component allows method override parameters to bypass CSRF checks by changing the HTTP request method to an arbitrary string that is not in the list of request methods that CakePHP checks. Additionally, the route middleware does not verify that this overriden method (which can be an arbitrary string) is actually an HTTP method."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-20T23:37:02",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-35239",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability exists in CakePHP versions 4.0.x through 4.1.3. The CsrfProtectionMiddleware component allows method override parameters to bypass CSRF checks by changing the HTTP request method to an arbitrary string that is not in the list of request methods that CakePHP checks. Additionally, the route middleware does not verify that this overriden method (which can be an arbitrary string) is actually an HTTP method."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html",
"refsource": "MISC",
"url": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-35239",
"datePublished": "2021-01-20T23:37:02",
"dateReserved": "2020-12-14T00:00:00",
"dateUpdated": "2024-08-04T17:02:07.018Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-11458 (GCVE-0-2019-11458)
Vulnerability from cvelistv5 – Published: 2019-05-08 17:07 – Updated: 2024-08-04 22:55
VLAI?
Summary
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:55:40.204Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/releases"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commits/master"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-05-08T17:07:54",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cakephp/cakephp/releases"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cakephp/cakephp/commits/master"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-11458",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/cakephp/cakephp/releases",
"refsource": "MISC",
"url": "https://github.com/cakephp/cakephp/releases"
},
{
"name": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7",
"refsource": "MISC",
"url": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7"
},
{
"name": "https://github.com/cakephp/cakephp/commits/master",
"refsource": "MISC",
"url": "https://github.com/cakephp/cakephp/commits/master"
},
{
"name": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html",
"refsource": "CONFIRM",
"url": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html"
},
{
"name": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e",
"refsource": "CONFIRM",
"url": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-11458",
"datePublished": "2019-05-08T17:07:54",
"dateReserved": "2019-04-22T00:00:00",
"dateUpdated": "2024-08-04T22:55:40.204Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2016-4793 (GCVE-0-2016-4793)
Vulnerability from cvelistv5 – Published: 2017-01-23 21:00 – Updated: 2024-08-06 00:39
VLAI?
Summary
The clientIp function in CakePHP 3.2.4 and earlier allows remote attackers to spoof their IP via the CLIENT-IP HTTP header.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:39:26.212Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX236992"
},
{
"name": "39813",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/39813/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt"
},
{
"name": "95846",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/95846"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-03-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The clientIp function in CakePHP 3.2.4 and earlier allows remote attackers to spoof their IP via the CLIENT-IP HTTP header."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-23T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.citrix.com/article/CTX236992"
},
{
"name": "39813",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/39813/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt"
},
{
"name": "95846",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/95846"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-4793",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The clientIp function in CakePHP 3.2.4 and earlier allows remote attackers to spoof their IP via the CLIENT-IP HTTP header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.citrix.com/article/CTX236992",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX236992"
},
{
"name": "39813",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39813/"
},
{
"name": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt",
"refsource": "MISC",
"url": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt"
},
{
"name": "95846",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95846"
},
{
"name": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html",
"refsource": "CONFIRM",
"url": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-4793",
"datePublished": "2017-01-23T21:00:00",
"dateReserved": "2016-05-12T00:00:00",
"dateUpdated": "2024-08-06T00:39:26.212Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-8379 (GCVE-0-2015-8379)
Vulnerability from cvelistv5 – Published: 2016-01-26 19:00 – Updated: 2024-08-06 08:13
VLAI?
Summary
CakePHP 2.x and 3.x before 3.1.5 might allow remote attackers to bypass the CSRF protection mechanism via the _method parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:13:32.492Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/537317/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://karmainsecurity.com/KIS-2016-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2016/Jan/42"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-11-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "CakePHP 2.x and 3.x before 3.1.5 might allow remote attackers to bypass the CSRF protection mechanism via the _method parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/537317/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://karmainsecurity.com/KIS-2016-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2016/Jan/42"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-8379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CakePHP 2.x and 3.x before 3.1.5 might allow remote attackers to bypass the CSRF protection mechanism via the _method parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html"
},
{
"name": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html",
"refsource": "MISC",
"url": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537317/100/0/threaded"
},
{
"name": "http://karmainsecurity.com/KIS-2016-01",
"refsource": "MISC",
"url": "http://karmainsecurity.com/KIS-2016-01"
},
{
"name": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html",
"refsource": "CONFIRM",
"url": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Jan/42"
},
{
"name": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0",
"refsource": "CONFIRM",
"url": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-8379",
"datePublished": "2016-01-26T19:00:00",
"dateReserved": "2015-12-01T00:00:00",
"dateUpdated": "2024-08-06T08:13:32.492Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3712 (GCVE-0-2011-3712)
Vulnerability from cvelistv5 – Published: 2011-09-23 23:00 – Updated: 2024-09-17 00:36
VLAI?
Summary
CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by dispatcher.php and certain other files.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:46:02.608Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by dispatcher.php and certain other files."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-09-23T23:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3712",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by dispatcher.php and certain other files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-3712",
"datePublished": "2011-09-23T23:00:00Z",
"dateReserved": "2011-09-23T00:00:00Z",
"dateUpdated": "2024-09-17T00:36:34.454Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-4335 (GCVE-0-2010-4335)
Vulnerability from cvelistv5 – Published: 2011-01-14 22:00 – Updated: 2024-08-07 03:43
VLAI?
Summary
The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:43:14.558Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb"
},
{
"name": "16011",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/16011"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt"
},
{
"name": "69352",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/69352"
},
{
"name": "8026",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/8026"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://malloc.im/CakePHP-unserialize.txt"
},
{
"name": "42211",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42211"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-12-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-01-22T10:00:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb"
},
{
"name": "16011",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/16011"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt"
},
{
"name": "69352",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/69352"
},
{
"name": "8026",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/8026"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://malloc.im/CakePHP-unserialize.txt"
},
{
"name": "42211",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42211"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4335",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb",
"refsource": "CONFIRM",
"url": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb"
},
{
"name": "16011",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/16011"
},
{
"name": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt"
},
{
"name": "69352",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/69352"
},
{
"name": "8026",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8026"
},
{
"name": "http://malloc.im/CakePHP-unserialize.txt",
"refsource": "MISC",
"url": "http://malloc.im/CakePHP-unserialize.txt"
},
{
"name": "42211",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42211"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-4335",
"datePublished": "2011-01-14T22:00:00",
"dateReserved": "2010-11-30T00:00:00",
"dateUpdated": "2024-08-07T03:43:14.558Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5031 (GCVE-0-2006-5031)
Vulnerability from cvelistv5 – Published: 2006-09-27 23:00 – Updated: 2024-08-07 19:32
VLAI?
Summary
Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, followed by a filename ending with "%00" and a .js filename.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:32:23.306Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cakephp-vendors-information-disclosure(29115)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29115"
},
{
"name": "22040",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22040"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=134"
},
{
"name": "20150",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/20150"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-09-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, followed by a filename ending with \"%00\" and a .js filename."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "cakephp-vendors-information-disclosure(29115)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29115"
},
{
"name": "22040",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22040"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=134"
},
{
"name": "20150",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/20150"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5031",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, followed by a filename ending with \"%00\" and a .js filename."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cakephp-vendors-information-disclosure(29115)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29115"
},
{
"name": "22040",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22040"
},
{
"name": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006",
"refsource": "MISC",
"url": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006"
},
{
"name": "http://cakeforge.org/frs/shownotes.php?release_id=134",
"refsource": "CONFIRM",
"url": "http://cakeforge.org/frs/shownotes.php?release_id=134"
},
{
"name": "20150",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20150"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5031",
"datePublished": "2006-09-27T23:00:00",
"dateReserved": "2006-09-27T00:00:00",
"dateUpdated": "2024-08-07T19:32:23.306Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4067 (GCVE-0-2006-4067)
Vulnerability from cvelistv5 – Published: 2006-08-10 00:00 – Updated: 2024-08-07 18:57
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 ("Not Found") error page. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:57:46.243Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19372",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19372"
},
{
"name": "21383",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21383"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=124"
},
{
"name": "ADV-2006-3172",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3172"
},
{
"name": "cakephp-error-xss(28256)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28256"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 (\"Not Found\") error page. NOTE: some of these details are obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19372",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19372"
},
{
"name": "21383",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21383"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=124"
},
{
"name": "ADV-2006-3172",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3172"
},
{
"name": "cakephp-error-xss(28256)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28256"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4067",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 (\"Not Found\") error page. NOTE: some of these details are obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19372",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19372"
},
{
"name": "21383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21383"
},
{
"name": "http://cakeforge.org/frs/shownotes.php?release_id=124",
"refsource": "CONFIRM",
"url": "http://cakeforge.org/frs/shownotes.php?release_id=124"
},
{
"name": "ADV-2006-3172",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3172"
},
{
"name": "cakephp-error-xss(28256)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28256"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4067",
"datePublished": "2006-08-10T00:00:00",
"dateReserved": "2006-08-09T00:00:00",
"dateUpdated": "2024-08-07T18:57:46.243Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-22727 (GCVE-0-2023-22727)
Vulnerability from nvd – Published: 2023-01-17 20:41 – Updated: 2025-03-10 21:22
VLAI?
Title
Database Query::offset() and limit() vulnerable to SQL injection in cakephp
Summary
CakePHP is a development framework for PHP web apps. In affected versions the `Cake\Database\Query::limit()` and `Cake\Database\Query::offset()` methods are vulnerable to SQL injection if passed un-sanitized user request data. This issue has been fixed in 4.2.12, 4.3.11, 4.4.10. Users are advised to upgrade. Users unable to upgrade may mitigate this issue by using CakePHP's Pagination library. Manually validating or casting parameters to these methods will also mitigate the issue.
Severity ?
9.8 (Critical)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:13:50.233Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp"
},
{
"name": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239"
},
{
"name": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22727",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T20:59:15.575626Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-10T21:22:35.657Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "cakephp",
"vendor": "cakephp",
"versions": [
{
"status": "affected",
"version": "\u003e= 4.2.0, \u003c 4.2.12"
},
{
"status": "affected",
"version": "\u003e= 4.3.0, \u003c 4.3.11"
},
{
"status": "affected",
"version": "\u003e= 4.4.0, \u003c 4.4.10"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "CakePHP is a development framework for PHP web apps. In affected versions the `Cake\\Database\\Query::limit()` and `Cake\\Database\\Query::offset()` methods are vulnerable to SQL injection if passed un-sanitized user request data. This issue has been fixed in 4.2.12, 4.3.11, 4.4.10. Users are advised to upgrade. Users unable to upgrade may mitigate this issue by using CakePHP\u0027s Pagination library. Manually validating or casting parameters to these methods will also mitigate the issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-17T20:41:10.143Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp"
},
{
"name": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239"
},
{
"name": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html",
"tags": [
"x_refsource_MISC"
],
"url": "https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html"
}
],
"source": {
"advisory": "GHSA-6g8q-qfpv-57wp",
"discovery": "UNKNOWN"
},
"title": "Database Query::offset() and limit() vulnerable to SQL injection in cakephp"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-22727",
"datePublished": "2023-01-17T20:41:10.143Z",
"dateReserved": "2023-01-06T14:21:05.890Z",
"dateUpdated": "2025-03-10T21:22:35.657Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-35239 (GCVE-0-2020-35239)
Vulnerability from nvd – Published: 2021-01-20 23:37 – Updated: 2024-08-04 17:02
VLAI?
Summary
A vulnerability exists in CakePHP versions 4.0.x through 4.1.3. The CsrfProtectionMiddleware component allows method override parameters to bypass CSRF checks by changing the HTTP request method to an arbitrary string that is not in the list of request methods that CakePHP checks. Additionally, the route middleware does not verify that this overriden method (which can be an arbitrary string) is actually an HTTP method.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:02:07.018Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in CakePHP versions 4.0.x through 4.1.3. The CsrfProtectionMiddleware component allows method override parameters to bypass CSRF checks by changing the HTTP request method to an arbitrary string that is not in the list of request methods that CakePHP checks. Additionally, the route middleware does not verify that this overriden method (which can be an arbitrary string) is actually an HTTP method."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-20T23:37:02",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-35239",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability exists in CakePHP versions 4.0.x through 4.1.3. The CsrfProtectionMiddleware component allows method override parameters to bypass CSRF checks by changing the HTTP request method to an arbitrary string that is not in the list of request methods that CakePHP checks. Additionally, the route middleware does not verify that this overriden method (which can be an arbitrary string) is actually an HTTP method."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html",
"refsource": "MISC",
"url": "https://bakery.cakephp.org/2020/12/07/cakephp_4010_released.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-35239",
"datePublished": "2021-01-20T23:37:02",
"dateReserved": "2020-12-14T00:00:00",
"dateUpdated": "2024-08-04T17:02:07.018Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-11458 (GCVE-0-2019-11458)
Vulnerability from nvd – Published: 2019-05-08 17:07 – Updated: 2024-08-04 22:55
VLAI?
Summary
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:55:40.204Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/releases"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commits/master"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-05-08T17:07:54",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cakephp/cakephp/releases"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cakephp/cakephp/commits/master"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-11458",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/cakephp/cakephp/releases",
"refsource": "MISC",
"url": "https://github.com/cakephp/cakephp/releases"
},
{
"name": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7",
"refsource": "MISC",
"url": "https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7"
},
{
"name": "https://github.com/cakephp/cakephp/commits/master",
"refsource": "MISC",
"url": "https://github.com/cakephp/cakephp/commits/master"
},
{
"name": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html",
"refsource": "CONFIRM",
"url": "https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html"
},
{
"name": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e",
"refsource": "CONFIRM",
"url": "https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-11458",
"datePublished": "2019-05-08T17:07:54",
"dateReserved": "2019-04-22T00:00:00",
"dateUpdated": "2024-08-04T22:55:40.204Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2016-4793 (GCVE-0-2016-4793)
Vulnerability from nvd – Published: 2017-01-23 21:00 – Updated: 2024-08-06 00:39
VLAI?
Summary
The clientIp function in CakePHP 3.2.4 and earlier allows remote attackers to spoof their IP via the CLIENT-IP HTTP header.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:39:26.212Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX236992"
},
{
"name": "39813",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/39813/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt"
},
{
"name": "95846",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/95846"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-03-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The clientIp function in CakePHP 3.2.4 and earlier allows remote attackers to spoof their IP via the CLIENT-IP HTTP header."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-23T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.citrix.com/article/CTX236992"
},
{
"name": "39813",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/39813/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt"
},
{
"name": "95846",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/95846"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-4793",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The clientIp function in CakePHP 3.2.4 and earlier allows remote attackers to spoof their IP via the CLIENT-IP HTTP header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.citrix.com/article/CTX236992",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX236992"
},
{
"name": "39813",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39813/"
},
{
"name": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt",
"refsource": "MISC",
"url": "http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt"
},
{
"name": "95846",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95846"
},
{
"name": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html",
"refsource": "CONFIRM",
"url": "https://bakery.cakephp.org/2016/03/13/cakephp_2613_2711_282_3017_3112_325_released.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-4793",
"datePublished": "2017-01-23T21:00:00",
"dateReserved": "2016-05-12T00:00:00",
"dateUpdated": "2024-08-06T00:39:26.212Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-8379 (GCVE-0-2015-8379)
Vulnerability from nvd – Published: 2016-01-26 19:00 – Updated: 2024-08-06 08:13
VLAI?
Summary
CakePHP 2.x and 3.x before 3.1.5 might allow remote attackers to bypass the CSRF protection mechanism via the _method parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:13:32.492Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/537317/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://karmainsecurity.com/KIS-2016-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2016/Jan/42"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-11-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "CakePHP 2.x and 3.x before 3.1.5 might allow remote attackers to bypass the CSRF protection mechanism via the _method parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/537317/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://karmainsecurity.com/KIS-2016-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2016/Jan/42"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-8379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CakePHP 2.x and 3.x before 3.1.5 might allow remote attackers to bypass the CSRF protection mechanism via the _method parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html"
},
{
"name": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html",
"refsource": "MISC",
"url": "http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/537317/100/0/threaded"
},
{
"name": "http://karmainsecurity.com/KIS-2016-01",
"refsource": "MISC",
"url": "http://karmainsecurity.com/KIS-2016-01"
},
{
"name": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html",
"refsource": "CONFIRM",
"url": "http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html"
},
{
"name": "20160115 [KIS-2016-01] CakePHP \u003c= 3.2.0 \"_method\" CSRF Protection Bypass Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Jan/42"
},
{
"name": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0",
"refsource": "CONFIRM",
"url": "https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-8379",
"datePublished": "2016-01-26T19:00:00",
"dateReserved": "2015-12-01T00:00:00",
"dateUpdated": "2024-08-06T08:13:32.492Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3712 (GCVE-0-2011-3712)
Vulnerability from nvd – Published: 2011-09-23 23:00 – Updated: 2024-09-17 00:36
VLAI?
Summary
CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by dispatcher.php and certain other files.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:46:02.608Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by dispatcher.php and certain other files."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-09-23T23:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3712",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by dispatcher.php and certain other files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-3712",
"datePublished": "2011-09-23T23:00:00Z",
"dateReserved": "2011-09-23T00:00:00Z",
"dateUpdated": "2024-09-17T00:36:34.454Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-4335 (GCVE-0-2010-4335)
Vulnerability from nvd – Published: 2011-01-14 22:00 – Updated: 2024-08-07 03:43
VLAI?
Summary
The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:43:14.558Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb"
},
{
"name": "16011",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/16011"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt"
},
{
"name": "69352",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/69352"
},
{
"name": "8026",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/8026"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://malloc.im/CakePHP-unserialize.txt"
},
{
"name": "42211",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42211"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-12-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-01-22T10:00:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb"
},
{
"name": "16011",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/16011"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt"
},
{
"name": "69352",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/69352"
},
{
"name": "8026",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/8026"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://malloc.im/CakePHP-unserialize.txt"
},
{
"name": "42211",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42211"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4335",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb",
"refsource": "CONFIRM",
"url": "https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb"
},
{
"name": "16011",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/16011"
},
{
"name": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt"
},
{
"name": "69352",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/69352"
},
{
"name": "8026",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8026"
},
{
"name": "http://malloc.im/CakePHP-unserialize.txt",
"refsource": "MISC",
"url": "http://malloc.im/CakePHP-unserialize.txt"
},
{
"name": "42211",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42211"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-4335",
"datePublished": "2011-01-14T22:00:00",
"dateReserved": "2010-11-30T00:00:00",
"dateUpdated": "2024-08-07T03:43:14.558Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5031 (GCVE-0-2006-5031)
Vulnerability from nvd – Published: 2006-09-27 23:00 – Updated: 2024-08-07 19:32
VLAI?
Summary
Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, followed by a filename ending with "%00" and a .js filename.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:32:23.306Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cakephp-vendors-information-disclosure(29115)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29115"
},
{
"name": "22040",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22040"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=134"
},
{
"name": "20150",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/20150"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-09-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, followed by a filename ending with \"%00\" and a .js filename."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "cakephp-vendors-information-disclosure(29115)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29115"
},
{
"name": "22040",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22040"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=134"
},
{
"name": "20150",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/20150"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5031",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, followed by a filename ending with \"%00\" and a .js filename."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cakephp-vendors-information-disclosure(29115)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29115"
},
{
"name": "22040",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22040"
},
{
"name": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006",
"refsource": "MISC",
"url": "http://www.gulftech.org/?node=research\u0026article_id=00114-09212006"
},
{
"name": "http://cakeforge.org/frs/shownotes.php?release_id=134",
"refsource": "CONFIRM",
"url": "http://cakeforge.org/frs/shownotes.php?release_id=134"
},
{
"name": "20150",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20150"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5031",
"datePublished": "2006-09-27T23:00:00",
"dateReserved": "2006-09-27T00:00:00",
"dateUpdated": "2024-08-07T19:32:23.306Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4067 (GCVE-0-2006-4067)
Vulnerability from nvd – Published: 2006-08-10 00:00 – Updated: 2024-08-07 18:57
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 ("Not Found") error page. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:57:46.243Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19372",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19372"
},
{
"name": "21383",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21383"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=124"
},
{
"name": "ADV-2006-3172",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3172"
},
{
"name": "cakephp-error-xss(28256)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28256"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 (\"Not Found\") error page. NOTE: some of these details are obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19372",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19372"
},
{
"name": "21383",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21383"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cakeforge.org/frs/shownotes.php?release_id=124"
},
{
"name": "ADV-2006-3172",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3172"
},
{
"name": "cakephp-error-xss(28256)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28256"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4067",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 (\"Not Found\") error page. NOTE: some of these details are obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19372",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19372"
},
{
"name": "21383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21383"
},
{
"name": "http://cakeforge.org/frs/shownotes.php?release_id=124",
"refsource": "CONFIRM",
"url": "http://cakeforge.org/frs/shownotes.php?release_id=124"
},
{
"name": "ADV-2006-3172",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3172"
},
{
"name": "cakephp-error-xss(28256)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28256"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4067",
"datePublished": "2006-08-10T00:00:00",
"dateReserved": "2006-08-09T00:00:00",
"dateUpdated": "2024-08-07T18:57:46.243Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}