CVE-2009-1085
 
Severity Score
7.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Piwik 0.2.32 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain the API key and other sensitive information via a direct request for misc/cron/archive.sh.
Piwik v0.2.32 y anterioes almacenan información sensible bajo en directorio raíz Web con control de acceso insuficiente, lo que permite a atacantes remotos conseguir la clave API y otra información sensible a través de una petición directa de misc/cron/archive.sh.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2009-03-25 CVE Reserved
- 2009-03-25 CVE Published
- 2024-09-17 CVE Updated
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://dev.piwik.org/trac/ticket/599 | X_refsource_confirm | |
http://marco-ziesing.de/archives/35-Schluesselloch-in-Piwik.html | X_refsource_misc | |
http://www.openwall.com/lists/oss-security/2009/03/23/2 | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | <= 0.2.32 Search vendor "Matomo" for product "Matomo" and version " <= 0.2.32" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.25 Search vendor "Matomo" for product "Matomo" and version "0.2.25" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.26 Search vendor "Matomo" for product "Matomo" and version "0.2.26" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.27 Search vendor "Matomo" for product "Matomo" and version "0.2.27" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.28 Search vendor "Matomo" for product "Matomo" and version "0.2.28" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.29 Search vendor "Matomo" for product "Matomo" and version "0.2.29" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.30 Search vendor "Matomo" for product "Matomo" and version "0.2.30" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.31 Search vendor "Matomo" for product "Matomo" and version "0.2.31" | - |
Affected
|