cvelist/2005/0xxx/CVE-2005-0316.json
2019-03-18 01:16:15 +00:00

87 lines
2.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-0316",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "14058",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14058"
},
{
"name": "12394",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12394"
},
{
"name": "20050128 WebWasher Classic - HTTP CONNECT weakness",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110693045507245&w=2"
},
{
"name": "webwasher-classic-connect-gain-access(19144)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19144"
},
{
"name": "http://www.oliverkarow.de/research/WebWasherCONNECT.txt",
"refsource": "MISC",
"url": "http://www.oliverkarow.de/research/WebWasherCONNECT.txt"
},
{
"name": "1013036",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1013036"
}
]
}
}