{ "id": "CVE-2008-5742", "sourceIdentifier": "cve@mitre.org", "published": "2008-12-26T20:30:00.360", "lastModified": "2017-09-29T01:32:46.620", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Multiple open redirect vulnerabilities in AIST NetCat 3.12 and earlier allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the redirect parameter in a logoff action to modules/auth/index.php or (2) the url parameter to modules/linkmanager/redirect.php. NOTE: this was reported within an \"HTTP Response Splitting\" section in the original disclosure." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de redirecci\u00f3n abierta en AIST NetCat 3.12 y anteriores permite a atacantes remotos redirigir usuarios a sitios web de su elecci\u00f3n y llevar a cabo ataques de phishing mediante (1) el par\u00e1metro redirect en una acci\u00f3n de logoff a modules/auth/index.php o (2) el par\u00e1metro url a modules/linkmanager/redirect.php. NOTA: esto se report\u00f3 en una secci\u00f3n \"Separaci\u00f3n de Respuesta HTTP\" en el momento que se mostr\u00f3 el original." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 4.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-59" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:netcat:netcat:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.12", "matchCriteriaId": "0AEB2D63-CC6D-4A4E-B74F-05ED07069920" }, { "vulnerable": true, "criteria": "cpe:2.3:a:netcat:netcat:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B63CEAE5-9423-4CBA-A493-D5EC71441857" }, { "vulnerable": true, "criteria": "cpe:2.3:a:netcat:netcat:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B52E6C38-426E-49F4-9BA7-CF83ACDB97D7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:netcat:netcat:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A988705-A606-4AA2-8753-3F95226CDCE1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:netcat:netcat:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "894816D2-6D9F-4417-B67D-141A5D4B66B8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:netcat:netcat:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8C3740EA-278A-45ED-879D-FB8B25394F03" }, { "vulnerable": true, "criteria": "cpe:2.3:a:netcat:netcat:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "604479AA-BA7C-4793-A6D5-E7DEA5D7461F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:netcat:netcat:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "07F9D73E-1A8D-4863-9A4C-3B650175206C" } ] } ] } ], "references": [ { "url": "http://securityreason.com/securityalert/4819", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/32992", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://www.exploit-db.com/exploits/7560", "source": "cve@mitre.org" } ] }