Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://drupalcode.org/project/cdn.git/commitdiff/eca85e6", "name": "http://drupalcode.org/project/cdn.git/commitdiff/eca85e6", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/48032", "name": "48032", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "https://drupal.org/node/1441502", "name": "https://drupal.org/node/1441502", "tags": ["Patch", "Vendor Advisory"], "refsource": "MISC"}, {"url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", "name": "[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "tags": [], "refsource": "MLIST"}, {"url": "http://drupal.org/node/1441480", "name": "http://drupal.org/node/1441480", "tags": [], "refsource": "CONFIRM"}, {"url": "http://drupalcode.org/project/cdn.git/commitdiff/cd2a5ff", "name": "http://drupalcode.org/project/cdn.git/commitdiff/cd2a5ff", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://drupal.org/node/1441482", "name": "http://drupal.org/node/1441482", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://www.osvdb.org/79317", "name": "79317", "tags": [], "refsource": "OSVDB"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The CDN module 6.x-2.2 and 7.x-2.2 for Drupal, when running in Origin Pull mode with the \"Far Future expiration\" option enabled, allows remote attackers to read arbitrary PHP files via unspecified vectors, as demonstrated by reading settings.php."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-200"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2012-1645", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 2.6, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "HIGH", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "LOW", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2012-08-28T17:55Z", "configurations": {"nodes": [{"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:wimleers:cdn:6.x-2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:wimleers:cdn:7.x-2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2012-08-29T04:00Z"}