2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2004-2493" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2004-12-31T05:00:00.000" ,
2024-11-21 23:11:37 +00:00
"lastModified" : "2024-11-20T23:53:29.510" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Directory traversal vulnerability in Groupmax World Wide Web (GmaxWWW) 2 and 3, and Desktop 5, 6, and Desktop for Jichitai allows remote authenticated users to read arbitrary .html files via the template name parameter."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N" ,
2024-11-21 23:11:37 +00:00
"baseScore" : 4.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-21 23:11:37 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web:2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A92F603-AD3F-4308-A1CB-19C3520BD9D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web:02_00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98DB68FE-C47E-4B81-93C4-DC864FCA025D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web:02_20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FD40CA2E-B904-4447-A5B5-F29D7BCE14F9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web:02_20_a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "74813442-83C0-4BB5-BF80-153F24E9C784"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web:02_31_i:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D3F09B3-A630-4AD2-BCBB-7FEE84ABE233"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web:3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F7921EB-BE36-4E86-A27F-2299F207BD9E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web:03_00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D52116E-3F2D-4902-BDF9-3636887FD605"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web:03_10_h:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B41B9635-F155-4568-BC02-8DB5E5856798"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web:03_11_b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C27C4AF-DB0A-4D83-B812-A2BE2871D718"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5220355B-6334-44E9-BFC8-331129C2AFE2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:05_00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6D1F873-4348-407C-96E7-63B75827941C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:05_11_f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3DBE5F6F-BB80-4762-AAB3-D30C6FC8A3B3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:05_11_i:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "70A57E9D-3FC5-443E-9671-0CF76440A11E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:05_11_j:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4908E99C-D9B1-4EBD-B9F0-74FFED092FAA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06631C10-25DC-4733-A1D2-F37556978AE7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0A012F2-A12D-45D0-95F0-4ECD97FD49AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_50_b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C74B3CD8-3D60-472E-97CB-37CF1BDFF371"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_50_c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72344FDE-11AA-4142-8367-9C76F33DB702"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_51:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7AAF89A0-E719-4273-890E-319EA8B81C23"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_51:*:jichitai:*:*:*:*:*" ,
"matchCriteriaId" : "DDCC2769-BE0E-4AB0-8192-C0B9CCA23BF5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_51_b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FDAC245A-9C8C-4E90-86D7-7EFF829B1F36"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_51_c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8580D3CE-98F0-4A07-8B92-50609EA333FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_52:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B344E3DA-A767-4868-B249-873B1A67B016"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_52:*:jichitai:*:*:*:*:*" ,
"matchCriteriaId" : "2F6136B7-F035-42DB-920B-D421451AD267"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_52_b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B17C3BFE-8AB7-4FDB-9EEC-F8EE1B566246"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:gold:*:jichitai:*:*:*:*:*" ,
"matchCriteriaId" : "F4E726B3-7120-42B3-BC90-CB08BB1FBB9E"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/13321" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/12153" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/bid/11773" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18278" ,
"source" : "cve@mitre.org"
2024-11-21 23:11:37 +00:00
} ,
{
"url" : "http://secunia.com/advisories/13321" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.osvdb.org/12153" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/11773" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18278" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}