124 lines
3.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2001-0922",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-11-26T05:00:00.000",
"lastModified": "2024-11-20T23:36:26.767",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "ndcgi.exe in Netdynamics 4.x through 5.x, and possibly earlier versions, allows remote attackers to steal session IDs and hijack user sessions by reading the SPIDERSESSION and uniqueValue variables from the login field, then using those variables after the next user logs in."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:netdynamics:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9846C76-7DAB-4A3D-B5BC-B3541DEC868A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:netdynamics:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "46C84C01-0FCE-4D08-93AC-10E2AFB27D83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:netdynamics:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F35F3413-2754-4466-8200-E96EF08CFC82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:netdynamics:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2558DC6A-018B-4B67-A359-BA2027FADEEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:netdynamics:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2081CC00-92A4-4351-BD52-3EC2464ADD00"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=100681274915525&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/3583",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7620",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=100681274915525&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/3583",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7620",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}