FKIE_CVE-2008-1475

Vulnerability from fkie_nvd - Published: 2008-03-24 22:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
The xml-rpc server in Roundup 1.4.4 does not check property permissions, which allows attackers to bypass restrictions and edit or read restricted properties via the (1) list, (2) display, and (3) set methods.
References
cve@mitre.orghttp://secunia.com/advisories/29336Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29375Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30274
cve@mitre.orghttp://secunia.com/advisories/32805
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200805-21.xml
cve@mitre.orghttp://sourceforge.net/tracker/index.php?func=detail&aid=1907211&group_id=31577&atid=402788
cve@mitre.orghttp://www.securityfocus.com/bid/28238
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0891
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=436546
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41240
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-November/msg00478.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29336Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29375Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30274
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32805
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200805-21.xml
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/tracker/index.php?func=detail&aid=1907211&group_id=31577&atid=402788
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28238
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0891
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=436546
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41240
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00478.html
Impacted products
Vendor Product Version
roundup-tracker roundup *
roundup-tracker roundup 0.1.0
roundup-tracker roundup 0.1.1
roundup-tracker roundup 0.1.2
roundup-tracker roundup 0.1.3
roundup-tracker roundup 0.2.0
roundup-tracker roundup 0.2.1
roundup-tracker roundup 0.2.2
roundup-tracker roundup 0.2.3
roundup-tracker roundup 0.2.4
roundup-tracker roundup 0.2.5
roundup-tracker roundup 0.2.6
roundup-tracker roundup 0.2.7
roundup-tracker roundup 0.2.8
roundup-tracker roundup 0.3.0
roundup-tracker roundup 0.3.0
roundup-tracker roundup 0.3.0
roundup-tracker roundup 0.3.0
roundup-tracker roundup 0.4.0
roundup-tracker roundup 0.4.0
roundup-tracker roundup 0.4.0
roundup-tracker roundup 0.4.1
roundup-tracker roundup 0.4.2
roundup-tracker roundup 0.4.2
roundup-tracker roundup 0.5
roundup-tracker roundup 0.5.0
roundup-tracker roundup 0.5.0
roundup-tracker roundup 0.5.0
roundup-tracker roundup 0.5.0
roundup-tracker roundup 0.5.1
roundup-tracker roundup 0.5.2
roundup-tracker roundup 0.5.3
roundup-tracker roundup 0.5.4
roundup-tracker roundup 0.5.5
roundup-tracker roundup 0.5.6
roundup-tracker roundup 0.5.7
roundup-tracker roundup 0.5.8
roundup-tracker roundup 0.5.9
roundup-tracker roundup 0.6.0
roundup-tracker roundup 0.6.0
roundup-tracker roundup 0.6.0
roundup-tracker roundup 0.6.0
roundup-tracker roundup 0.6.0
roundup-tracker roundup 0.6.1
roundup-tracker roundup 0.6.2
roundup-tracker roundup 0.6.3
roundup-tracker roundup 0.6.4
roundup-tracker roundup 0.6.5
roundup-tracker roundup 0.6.6
roundup-tracker roundup 0.6.7
roundup-tracker roundup 0.6.8
roundup-tracker roundup 0.6.9
roundup-tracker roundup 0.6.10
roundup-tracker roundup 0.6.11
roundup-tracker roundup 0.7.0
roundup-tracker roundup 0.7.0
roundup-tracker roundup 0.7.0
roundup-tracker roundup 0.7.0
roundup-tracker roundup 0.7.1
roundup-tracker roundup 0.7.2
roundup-tracker roundup 0.7.3
roundup-tracker roundup 0.7.4
roundup-tracker roundup 0.7.5
roundup-tracker roundup 0.7.6
roundup-tracker roundup 0.7.7
roundup-tracker roundup 0.7.8
roundup-tracker roundup 0.7.9
roundup-tracker roundup 0.7.10
roundup-tracker roundup 0.7.11
roundup-tracker roundup 0.7.12
roundup-tracker roundup 0.8.0
roundup-tracker roundup 0.8.0
roundup-tracker roundup 0.8.0
roundup-tracker roundup 0.8.1
roundup-tracker roundup 0.8.2
roundup-tracker roundup 0.8.3
roundup-tracker roundup 0.8.4
roundup-tracker roundup 0.8.5
roundup-tracker roundup 0.8.6
roundup-tracker roundup 0.9.0
roundup-tracker roundup 1.0
roundup-tracker roundup 1.0.1
roundup-tracker roundup 1.1.0
roundup-tracker roundup 1.1.1
roundup-tracker roundup 1.1.2
roundup-tracker roundup 1.2.0
roundup-tracker roundup 1.2.1
roundup-tracker roundup 1.3.0
roundup-tracker roundup 1.3.1
roundup-tracker roundup 1.3.2
roundup-tracker roundup 1.3.3
roundup-tracker roundup 1.4.0
roundup-tracker roundup 1.4.1
roundup-tracker roundup 1.4.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE1D1977-97A0-4407-9767-D9E6D6F9F6AE",
              "versionEndIncluding": "1.4.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "19ECB7A0-10A6-4745-A14A-1FDCBA54FA3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9968A3F6-095B-40E8-B5B3-FF0B9DDF4D66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "53AB2FBF-3D72-4548-B7EF-A9966DDADE99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0079C51C-5341-4ABD-AEC3-ED95D6B3849E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942F581-EEE1-4475-91BC-A381F647DB4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EA6E14-83A2-4EB5-B288-1BAAAE7BB15E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B79CB12-0F99-4337-8FFE-300E1F2635A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7924E0-09DE-4231-8543-93F132C525D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5181473-7735-4C4D-84EB-45123A4CB2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "611D6B74-E98A-4060-A4E8-0066B23097C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDDDAB17-2E78-4F3A-8129-5F6B0AD6824C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC05048-471F-43B8-84F1-B3A4AD0BEB1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5EA1112-FD27-4560-99B9-F95CB4875B50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B1C7A4E-B709-45B9-820B-9DA47D09A768",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "12248494-B69A-493A-8BAA-AED8B6D90967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "83D18991-4357-4EDA-B58A-C2B2D55AF65C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre3:*:*:*:*:*:*",
              "matchCriteriaId": "3EA23543-A008-4A35-A2FD-A5C92419B5D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85911897-FF14-4287-A70C-2BE1533D7DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "C5AF4647-28B7-4A1F-8CE0-1AECF5E9DA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "7491CD5B-BE8B-43D9-9A9C-A9D9091FFF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C170F3BF-A954-4259-AFEA-8FBBA9A03E8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "368312AF-2FC0-4528-A735-FE8E6412637D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.4.2:pr1:*:*:*:*:*:*",
              "matchCriteriaId": "15A83A5C-A463-4A90-9C2B-CD4BF64D9F93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA22ED9-74AB-4B1A-AE32-002CBC70DD33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7035B-ACAD-43CC-8B0A-5D5C71ED4D00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5FF02B8B-EE0E-490C-B611-9E9073B08A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "FB0B1077-5E96-49D8-8C42-E1B269D977D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.0:pr1:*:*:*:*:*:*",
              "matchCriteriaId": "62D6C85E-EDA1-4F97-86F7-A55D0209E9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "046CAABB-4A40-4734-9506-FE9E5D74ED6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D7C743E-B264-4FEB-AE0D-6B63C6D25CD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "18AC89CD-2092-4694-8DA3-268466CB1728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EB5412-927B-49F4-B1F1-0890AB674F1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B52588E4-C6C4-45DE-B8C2-4948AEAA2E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C747D8A-1FD7-4E80-949F-49833D8A871B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "74CEEC73-4AF9-4E5A-A526-101E23A7ED2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.8:stable:*:*:*:*:*:*",
              "matchCriteriaId": "6890C793-5346-4274-91F6-D3A1F4D4454B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "10F15818-1EC9-4E72-8E10-BF7CBEE6DECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2136129D-9795-4281-A07E-297BE50A7A93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "31430BEC-1190-46F9-82B8-6EBE6CBE1BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "E0855645-97A3-4CA1-9A7C-3050151302E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "86F1057A-0273-4B77-8DD9-32D54676F991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "ACC3C30E-4796-49CE-AFDF-DC7B29737FAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "068DEB7C-DAC2-45D6-A0B6-DC54EF52DF14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "960311B7-4C1B-4D7F-B8D1-A99977C389D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "953F1AAF-CFF8-462C-99E4-7A4D8404BCEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "280DC837-EB0D-42EA-8236-FFD87B0987AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B57648C-D3D8-4ADE-8500-9E7CC170DF63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74C7F38-1DF5-4817-A6F7-F24E015346C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7305D65-2C60-4AC0-86E8-10A115EC008C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8829C3BE-C384-4CB5-9128-12338E1E68F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "134F2504-202E-456E-973F-CDF26EC119A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "67CB2FD7-7E9E-4395-98B9-7A97B2140A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "932E8C5F-23DC-4A3D-8683-095E98595A06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318627-2740-4FDC-BF08-87CD6AD82F8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8455602A-65E5-4DAE-9D66-CA9A226E5AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "5ABA002F-3226-4492-9E4A-F8D2BD0C0791",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "3595DB2B-EA69-4A47-B69D-3D526E9E9D89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D864CE13-3E5D-4A43-B45C-50FD73634828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E6CF969-C90B-47AD-8538-F865C6D96F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2ADB27-CC67-4E07-AB14-D4E7AFBAF41A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C00B6823-DDC4-455B-806E-20DC50C91CBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "25307B01-1BDF-402C-BAB8-3F79E3AD5FE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E4D7D-AEB3-431A-8EAD-AA0968F339A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE10C1E5-78C2-460D-BD73-97026C18D2D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAA37A04-8B76-41F5-BB6A-BC510100A59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E83205C4-D7BE-41C8-B4B2-76B265743D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAA29FD3-B9CE-47B8-9593-BD953C3ECC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "88EC7A4B-678F-4A87-9E7F-1F9B95647E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B45F23-702E-436A-BEF5-26AB0B7B3288",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C8C39E-F339-48A4-83AB-D89493070418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "0C1E36E4-C4C9-4AE9-A91E-504B75441D9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "CA49A32F-5932-4E3D-80F4-3F695E6D967E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98E71AD-3B23-44D8-B7DE-902B616BED76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "36336002-7EDC-47D2-A652-923C5DC99847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6893FFAD-A2D1-4C8B-983F-68C2899E56E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81944927-FFCF-4709-B80B-7279CE31A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5B11756-4710-4E9A-9E37-C3FA1C5E5B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DEAB81E-DAA8-49CD-AEC7-1492DE605172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:0.9.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "4AF05890-2633-4863-B545-ED923D9A4A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D00A7FA-8CC2-49DE-B515-7ADA3240549E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55982C77-F866-4298-BD46-E3DF136C6203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A92DF0-153B-4130-A12F-28A921673A94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E6A5DC6-8E85-4545-840A-3D5DF8FB3B2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85D14A2-5505-43CC-8416-6165C604D363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCEF97A-C493-41A8-8A7D-4A187F016AEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55B7551D-6264-4949-A038-6006F432F261",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12903A2D-44DF-4606-B4DB-0501786A22C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7032E7E5-B353-451C-AA8A-70F055DE68C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A11A4AFF-EE53-477D-9B82-6A65A6765DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F5E2921-8219-4F59-B877-C2BCF9C0AB02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0038D97D-E099-41FD-B467-C2FA8A1A04BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFDDF8D-B34E-4A31-A335-E41477436C44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:roundup-tracker:roundup:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "764F3225-B6F0-497E-B2BD-A6CBA40D06BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The xml-rpc server in Roundup 1.4.4 does not check property permissions, which allows attackers to bypass restrictions and edit or read restricted properties via the (1) list, (2) display, and (3) set methods."
    },
    {
      "lang": "es",
      "value": "El servidor xml-rpc en Roundup 1.4.4 no comprueba los permisos de propiedad, lo que permite a atacantes evitar restricciones y editar o leer propiedades restringidas a trav\u00e9s de los m\u00e9todos (1) list, (2) display y (3) set."
    }
  ],
  "id": "CVE-2008-1475",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-24T22:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29336"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29375"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30274"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32805"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200805-21.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1907211\u0026group_id=31577\u0026atid=402788"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28238"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0891"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436546"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41240"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00478.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29375"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30274"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32805"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200805-21.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1907211\u0026group_id=31577\u0026atid=402788"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436546"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41240"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00478.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…