{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T20:31:05.467","vulnerabilities":[{"cve":{"id":"CVE-2013-4267","sourceIdentifier":"secalert@redhat.com","published":"2020-02-11T12:15:11.507","lastModified":"2024-11-21T01:55:14.757","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Ajaxeplorer before 5.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) archive_name parameter to the Power FS module (plugins/action.powerfs/class.PowerFSController.php), a (2) file name to the getTrustSizeOnFileSystem function in the File System (Standard) module (plugins/access.fs/class.fsAccessWrapper.php), or the (3) revision parameter to the Subversion Repository module (plugins/meta.svn/class.SvnManager.php)."},{"lang":"es","value":"Ajaxeplorer versiones anteriores a 5.0.1, permite a atacantes remotos ejecutar comandos arbitrarios por medio de metacaracteres de shell en el (1) parámetro archive_name en el módulo Power FS (archivo plugins/action.powerfs/class.PowerFSController.php), un (2) nombre de archivo en la función getTrustSizeOnFileSystem en el módulo File System (Standard) (archivo plugins/access.fs/class.fsAccessWrapper.php), o el parámetro revision (3) en el módulo Subversion Repository (archivo plugins/meta.svn/class.SvnManager.php)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pydio:pydio:*:*:*:*:*:*:*:*","versionEndExcluding":"5.0.1","matchCriteriaId":"F2CEDC27-F583-4619-9FDA-0C152BF7B953"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2013/08/21/16","source":"secalert@redhat.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://github.com/pydio/pydio-core/commit/22a62840e5ac14bb389","source":"secalert@redhat.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.tenable.com/plugins/nessus/70495","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2013/08/21/16","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://github.com/pydio/pydio-core/commit/22a62840e5ac14bb389","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.tenable.com/plugins/nessus/70495","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}