{ "id": "CVE-2002-0107", "sourceIdentifier": "cve@mitre.org", "published": "2002-03-25T05:00:00.000", "lastModified": "2016-10-18T02:16:14.750", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Web administration interface in CacheFlow CacheOS 4.0.13 and earlier allows remote attackers to obtain sensitive information via a series of GET requests that do not end in with HTTP/1.0 or another version string, which causes the information to be leaked in the error message." }, { "lang": "es", "value": "El interfaz web de adminsitraci\u00f3n en CacheFlow CacheOS 4.0.13 y anteriores permite a atacantes remotos obtener informaci\u00f3n sensible mediante una serie de peticiones GET que no terminan con con 'HTTP/1.0' u otra cadena de versi\u00f3n, lo que produce fugas de informaci\u00f3n en el mensaje de error." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A43360C0-F97C-4856-B2F0-2054E1283E96" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "9508AE48-ACB1-4262-9225-BE82655E433E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.03:*:*:*:*:*:*:*", "matchCriteriaId": "AF51C047-A39B-4598-8AB6-A5BCD6544C72" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.04:*:*:*:*:*:*:*", "matchCriteriaId": "B53C88D9-9F78-4F2B-87AD-700BD7B5167D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "2B3DC615-974E-41F1-910F-8574A21B4C17" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "1F9CF9F8-CD3C-45BC-8669-FA44C1FA1D8A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.07:*:*:*:*:*:*:*", "matchCriteriaId": "4203A30C-9153-4C89-9604-D7E74861D2CE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.08:*:*:*:*:*:*:*", "matchCriteriaId": "1A284B71-00B5-4539-A176-4E231F81BCC0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.09:*:*:*:*:*:*:*", "matchCriteriaId": "4E4A3FCB-4222-448D-8A89-6A69E757593A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "1EB89566-E571-43D4-982B-B860C448F4CC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "DD20C05A-7040-4305-808A-E9A0AA1D7E98" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8E789A31-05A5-48BD-9B80-192B41D7AAF6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "9CFC926C-4463-41BD-A819-4AF19548E982" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "539BC4BB-5D6B-444B-B74F-14794F401680" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "0DFE513C-0EB2-453B-B169-F0B05302372A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E78563D4-5177-442C-B181-DD84E4D0E991" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "D1F6FB3F-23D2-4284-BB6E-E6FED09929F9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "6FFAB96C-91F8-4244-A41D-1B9FC1015063" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "C3580F58-C6B7-4A52-888D-45C3FB10CA80" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:3.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "3884B739-CD22-4D24-8CB4-20D26219C379" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "F6E1982C-61B6-4BCF-9406-80713CDD021B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "CB5378EB-42E0-4EEF-A658-DD20F21D545E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cacheflow:cacheos:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "34E3DB9D-309D-4D03-AD5A-5B74CBB4E24C" } ] } ] } ], "references": [ { "url": "http://marc.info/?l=bugtraq&m=101052887431488&w=2", "source": "cve@mitre.org" }, { "url": "http://online.securityfocus.com/archive/1/254167", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/7835.php", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/3841", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ] } ] }