CVE-2012-0811
Vulnerability from cvelistv5
Published
2014-10-01 14:00
Modified
2024-08-06 18:38
Severity ?
Summary
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.403Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "51680",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51680"
          },
          {
            "name": "[oss-security] 20120126 CVE request: PostfixAdmin SQL injections and XSS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/01/26/5"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT"
          },
          {
            "name": "[oss-security] 20120127 Re: CVE request: PostfixAdmin SQL injections and XSS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/01/27/5"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-10-01T13:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "51680",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51680"
        },
        {
          "name": "[oss-security] 20120126 CVE request: PostfixAdmin SQL injections and XSS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/01/26/5"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT"
        },
        {
          "name": "[oss-security] 20120127 Re: CVE request: PostfixAdmin SQL injections and XSS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/01/27/5"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-0811",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "51680",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51680"
            },
            {
              "name": "[oss-security] 20120126 CVE request: PostfixAdmin SQL injections and XSS",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/01/26/5"
            },
            {
              "name": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin",
              "refsource": "MISC",
              "url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin"
            },
            {
              "name": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT",
              "refsource": "CONFIRM",
              "url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT"
            },
            {
              "name": "[oss-security] 20120127 Re: CVE request: PostfixAdmin SQL injections and XSS",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/01/27/5"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0811",
    "datePublished": "2014-10-01T14:00:00",
    "dateReserved": "2012-01-19T00:00:00",
    "dateUpdated": "2024-08-06T18:38:14.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.3.4\", \"matchCriteriaId\": \"23A80121-F089-4DE1-8086-7454D66E8FEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB5D16A3-59DA-407B-82E4-65C39EBD3710\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A7A4BE9-7CBE-404F-B577-933AC26E6E81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8872C496-2430-4EA6-B417-51C6877B874A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66B95D87-5B0B-48F6-8379-2521CFDE7CA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A09799F5-6084-4F06-B851-4FEA7873BF35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9230082E-FE88-4001-A614-43E8DD76471B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"258010A6-6B75-4663-AD5C-E7AD48B38DEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"602E668A-1343-457B-B0E1-CAB3CCA05BD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83C3C7F7-016F-458B-B40D-E06080552045\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE51A934-BFD2-4E61-9827-A934995BDCAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDF57DB8-3D17-4868-9FDF-81A0645FBC5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D7ECFA4-01CF-4C44-949D-7781767B724A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A568A8FC-7BB0-431B-8BFE-1BF28DD545B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2273956-8CEB-439E-8841-953580AE673D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E074865-92E2-4AFC-8542-00273FDFACEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1274628A-B6F8-48DA-A7B0-7629362A0383\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"123ED520-D9A9-457E-B0FF-2164678F2FDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F03CC36-4E01-4298-8BF2-208EC2126E2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA763611-3C94-40EB-AC16-F6860FCBFDAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8725859-159E-49A5-91F2-12A6B300AE76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D3B5347-F7FD-4291-8535-9D71F9F49568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2750F62-79D5-41ED-8624-4DC36A23A03D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1D09CC9-07C8-42C7-B7B2-25251C8615A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F28A5B6A-466B-4B24-9BD4-9DE15642A724\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8E7B624-C991-4EA1-A977-6C06F57B4E2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E899C1C0-18D1-43DE-BC55-C3C14F5395D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"903BF741-FD7E-41F7-802D-88A09B7EFFFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F0A444A-E6FE-4585-BA6C-6061A87C6144\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"161082B7-A757-496C-9D35-681851CEA10B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B02E2034-BB39-4B86-81CA-3BB93A4E4849\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29CF0FA6-F4F6-4A4B-89A6-057F835FFE89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0055B0EA-775F-4670-A3F9-C1676DBB97D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"363704AE-66A9-4B58-A57E-47748F299471\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5226F933-9FB6-4BF6-AC3B-1A22D22F92F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0066AE84-D27D-4E9B-851B-40EDFD07C0BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B739C7B-93CC-4367-B006-E8A721ECBCF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAE8A81E-3856-4908-B7B7-9CF511CA2A21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B935272-1EC7-4C70-8299-9DC7594809EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1647690F-D015-4DC4-9FB7-F5E9F0C430D9\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de inyecci\\u00f3n SQL en Postfix Admin (tambi\\u00e9n conocido como postfixadmin) anterior a 2.3.5 permiten a usuarios remotos autenticados ejecutar comandos SQL a trav\\u00e9s de (1) el par\\u00e1metro pw en la funci\\u00f3n pacrypt, cuando mysql_encrypt est\\u00e1 configurado, o (2) vectores no especificados que se utilizan en los ficheros de las copias de seguridad generados por backup.php.\"}]",
      "id": "CVE-2012-0811",
      "lastModified": "2024-11-21T01:35:46.227",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2014-10-01T14:55:10.120",
      "references": "[{\"url\": \"http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/01/26/5\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/01/27/5\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/51680\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/01/26/5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/01/27/5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/51680\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-0811\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-10-01T14:55:10.120\",\"lastModified\":\"2024-11-21T01:35:46.227\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Postfix Admin (tambi\u00e9n conocido como postfixadmin) anterior a 2.3.5 permiten a usuarios remotos autenticados ejecutar comandos SQL a trav\u00e9s de (1) el par\u00e1metro pw en la funci\u00f3n pacrypt, cuando mysql_encrypt est\u00e1 configurado, o (2) vectores no especificados que se utilizan en los ficheros de las copias de seguridad generados por backup.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.3.4\",\"matchCriteriaId\":\"23A80121-F089-4DE1-8086-7454D66E8FEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5D16A3-59DA-407B-82E4-65C39EBD3710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7A4BE9-7CBE-404F-B577-933AC26E6E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8872C496-2430-4EA6-B417-51C6877B874A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B95D87-5B0B-48F6-8379-2521CFDE7CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09799F5-6084-4F06-B851-4FEA7873BF35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9230082E-FE88-4001-A614-43E8DD76471B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"258010A6-6B75-4663-AD5C-E7AD48B38DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"602E668A-1343-457B-B0E1-CAB3CCA05BD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C3C7F7-016F-458B-B40D-E06080552045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE51A934-BFD2-4E61-9827-A934995BDCAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDF57DB8-3D17-4868-9FDF-81A0645FBC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7ECFA4-01CF-4C44-949D-7781767B724A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A568A8FC-7BB0-431B-8BFE-1BF28DD545B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2273956-8CEB-439E-8841-953580AE673D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E074865-92E2-4AFC-8542-00273FDFACEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1274628A-B6F8-48DA-A7B0-7629362A0383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123ED520-D9A9-457E-B0FF-2164678F2FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F03CC36-4E01-4298-8BF2-208EC2126E2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA763611-3C94-40EB-AC16-F6860FCBFDAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8725859-159E-49A5-91F2-12A6B300AE76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3B5347-F7FD-4291-8535-9D71F9F49568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2750F62-79D5-41ED-8624-4DC36A23A03D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D09CC9-07C8-42C7-B7B2-25251C8615A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28A5B6A-466B-4B24-9BD4-9DE15642A724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8E7B624-C991-4EA1-A977-6C06F57B4E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E899C1C0-18D1-43DE-BC55-C3C14F5395D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"903BF741-FD7E-41F7-802D-88A09B7EFFFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F0A444A-E6FE-4585-BA6C-6061A87C6144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"161082B7-A757-496C-9D35-681851CEA10B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02E2034-BB39-4B86-81CA-3BB93A4E4849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CF0FA6-F4F6-4A4B-89A6-057F835FFE89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0055B0EA-775F-4670-A3F9-C1676DBB97D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"363704AE-66A9-4B58-A57E-47748F299471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5226F933-9FB6-4BF6-AC3B-1A22D22F92F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0066AE84-D27D-4E9B-851B-40EDFD07C0BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B739C7B-93CC-4367-B006-E8A721ECBCF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE8A81E-3856-4908-B7B7-9CF511CA2A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B935272-1EC7-4C70-8299-9DC7594809EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1647690F-D015-4DC4-9FB7-F5E9F0C430D9\"}]}]}],\"references\":[{\"url\":\"http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/01/26/5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/01/27/5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/51680\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/01/26/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/01/27/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/51680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.