89 lines
2.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2003-0332",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-06-09T04:00:00.000",
"lastModified": "2016-10-18T02:32:36.880",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The ISAPI extension in BadBlue 1.7 through 2.2, and possibly earlier versions, modifies the first two letters of a filename extension after performing a security check, which allows remote attackers to bypass authentication via a filename with a .ats extension instead of a .hts extension."
},
{
"lang": "es",
"value": "La extendis\u00f3n ISAPI en BadBlue 1.7 hasta 2.2, y posiblemente versiones anteriores, modifica las dos primeras letras de la extensi\u00f3n de un archivo despu\u00e9s de realizar comprobaciones de seguridad, lo que permite que atacantes remotos pasen la autentificaci\u00f3n mediante un fichero .ats en lugar de uno .hts."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6
},
"baseSeverity": "HIGH",
"exploitabilityScore": 4.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:working_resources_inc.:badblue:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2",
"matchCriteriaId": "E20AAA6A-F743-4CAE-938F-F10C137B9CB0"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0075.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=105346382524169&w=2",
"source": "cve@mitre.org"
}
]
}