mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
94 lines
2.9 KiB
JSON
94 lines
2.9 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2009-0804",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2009-03-04T16:30:00.250",
|
||
|
"lastModified": "2009-06-18T04:00:00.000",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Cuando el modo de interceptaci\u00f3n transparente est\u00e1 activado en Ziproxy 2.6.0, usa la cabecera Host de HTTP para determinar el destino, lo que permite a atacantes remotos saltarse el control de acceso para Flash, Java y Silverlight, y probablemente otras tecnolog\u00edas, posiblemente podr\u00edan comunicarse con sitios restringidos de la Intranet, a trav\u00e9s de una p\u00e1gina Web manipulada que provoca que un cliente env\u00ede peticiones con un cabecera Host modificada."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "HIGH",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "COMPLETE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 5.4
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 4.9,
|
||
|
"impactScore": 6.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": true
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-264"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ziproxy:ziproxy:2.6.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B9CB5B52-3848-4206-BDAD-3D947DAE7B47"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://www.kb.cert.org/vuls/id/435052",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Third Party Advisory",
|
||
|
"US Government Resource"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.kb.cert.org/vuls/id/MAPG-7N9GN8",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/33858",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|