mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.7 KiB
JSON
87 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-0316",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "14058",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/14058"
|
|
},
|
|
{
|
|
"name": "12394",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/12394"
|
|
},
|
|
{
|
|
"name": "20050128 WebWasher Classic - HTTP CONNECT weakness",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://marc.info/?l=bugtraq&m=110693045507245&w=2"
|
|
},
|
|
{
|
|
"name": "webwasher-classic-connect-gain-access(19144)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19144"
|
|
},
|
|
{
|
|
"name": "http://www.oliverkarow.de/research/WebWasherCONNECT.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://www.oliverkarow.de/research/WebWasherCONNECT.txt"
|
|
},
|
|
{
|
|
"name": "1013036",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1013036"
|
|
}
|
|
]
|
|
}
|
|
} |