CVE-2011-0466
Published Apr 10, 2011
Last updated 14 years ago
Overview
- Description
- The API in SUSE openSUSE Build Service (OBS) 2.0.x before 2.0.8 and 2.1.x before 2.1.6 allows attackers to bypass intended write-access restrictions and modify a (1) package or (2) project via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6A4DC80-D559-4516-B2B8-67A10FA5E672" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "030EA7EE-F788-4813-96E1-E6FC21F749B8" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E1EED8C-ED06-40B1-8837-5319DB51009B" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16FBC9F4-BF69-4C8B-BC00-293BECF16624" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA6C8261-DD6F-461A-9358-5BFFEF85AD62" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9B75D0D-CC7A-4FE9-B71B-7A43D53DFAF3" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9899C0E7-B19F-4266-A69A-E34EE09290A3" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D85DAA0A-9A2E-4AEB-8C27-CB92A456CA39" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B1B927A-15CE-433D-880F-4CECFB0FDC5D" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CF698A5-B2B7-4918-BC1E-7D807C4E18F7" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.103:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A82F5A8-8638-420C-9244-B9373EBF2B4F" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.104:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DEF91AA-F15A-4A79-AB09-AF4F5D76E582" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.0.106:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51F8840F-EBBE-4A27-A523-E1A94411FC12" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45A10192-12C2-45D2-BA51-EBA142550EC5" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2B03379-450D-4598-8809-B5670A266020" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "289AEAF3-45E3-42F0-810D-8BC8B7F24717" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85393DBB-CC63-4646-913D-922A6B437919" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D713D43B-919C-4648-A6C8-C3DCE787AA03" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B352186-C486-4F15-B7F1-2061AC45EFB9" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14605A5E-7381-4CF5-AC58-4C23B20636E9" }, { "criteria": "cpe:2.3:a:novell:opensuse_build_service:2.1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F52F2BCB-1214-4581-9237-FD15C3CBDFA9" } ], "operator": "OR" } ] } ]