{ "id": "CVE-2009-1357", "sourceIdentifier": "cve@mitre.org", "published": "2009-04-23T17:30:01.860", "lastModified": "2018-10-10T19:36:19.857", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in da/DA/Login in Sun Java System Delegated Administrator 6.2 through 6.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the HELP_PAGE parameter." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n CRLF en da/DA/Login en Sun Java System Delegated Administrator desde v6.2 hasta v6.4 permite a atacantes remotos inyectar cabeceras HTTP de forma arbitraria y dirigir ataques de divisi\u00f3n de respuesta HTTP a trav\u00e9s del par\u00e1metro \"HELP_PAGE\"" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_delegated_administrator:6.2:-:sparc:*:*:*:*:*", "matchCriteriaId": "84FBFD6D-70D2-4068-A8FB-997F55962DBA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_delegated_administrator:6.3:-:sparc:*:*:*:*:*", "matchCriteriaId": "6DD69018-E00B-4A29-A1AD-0487756E763C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_delegated_administrator:6.4:-:sparc:*:*:*:*:*", "matchCriteriaId": "42C7A680-F66F-44B7-85E6-910F92EBB94F" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_delegated_administrator:6.2:-:x86:*:*:*:*:*", "matchCriteriaId": "60880A55-685E-4079-8501-96734549AA45" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_delegated_administrator:6.3:-:x86:*:*:*:*:*", "matchCriteriaId": "3DC59D17-A1A2-4D41-A163-270A33A0EE62" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_delegated_administrator:6.4:-:x86:*:*:*:*:*", "matchCriteriaId": "1C5A463D-99A0-413C-86C4-895696021474" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_delegated_administrator:6.2:-:linux:*:*:*:*:*", "matchCriteriaId": "45ED4043-563B-49BB-A6CB-32109E7F0E28" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_delegated_administrator:6.3:-:linux:*:*:*:*:*", "matchCriteriaId": "92BE2B12-7FA9-469F-8B91-D0D6C38E76F6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_delegated_administrator:6.4:-:linux:*:*:*:*:*", "matchCriteriaId": "4ADC7E16-A2B6-43D7-BB99-9A48B9DE3449" } ] } ] } ], "references": [ { "url": "http://securitytracker.com/id?1022108", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-121581-20-1", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-255928-1", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020305.1-1", "source": "cve@mitre.org" }, { "url": "http://www.coresecurity.com/content/sun-delegated-administrator", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/502863/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/34643", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.vupen.com/english/advisories/2009/1122", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50004", "source": "cve@mitre.org" } ] }