{ "id": "CVE-2004-2493", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", "lastModified": "2024-11-20T23:53:29.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Groupmax World Wide Web (GmaxWWW) 2 and 3, and Desktop 5, 6, and Desktop for Jichitai allows remote authenticated users to read arbitrary .html files via the template name parameter." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web:2:*:*:*:*:*:*:*", "matchCriteriaId": "7A92F603-AD3F-4308-A1CB-19C3520BD9D1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web:02_00:*:*:*:*:*:*:*", "matchCriteriaId": "98DB68FE-C47E-4B81-93C4-DC864FCA025D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web:02_20:*:*:*:*:*:*:*", "matchCriteriaId": "FD40CA2E-B904-4447-A5B5-F29D7BCE14F9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web:02_20_a:*:*:*:*:*:*:*", "matchCriteriaId": "74813442-83C0-4BB5-BF80-153F24E9C784" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web:02_31_i:*:*:*:*:*:*:*", "matchCriteriaId": "5D3F09B3-A630-4AD2-BCBB-7FEE84ABE233" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web:3:*:*:*:*:*:*:*", "matchCriteriaId": "0F7921EB-BE36-4E86-A27F-2299F207BD9E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web:03_00:*:*:*:*:*:*:*", "matchCriteriaId": "2D52116E-3F2D-4902-BDF9-3636887FD605" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web:03_10_h:*:*:*:*:*:*:*", "matchCriteriaId": "B41B9635-F155-4568-BC02-8DB5E5856798" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web:03_11_b:*:*:*:*:*:*:*", "matchCriteriaId": "6C27C4AF-DB0A-4D83-B812-A2BE2871D718" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:5:*:*:*:*:*:*:*", "matchCriteriaId": "5220355B-6334-44E9-BFC8-331129C2AFE2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:05_00:*:*:*:*:*:*:*", "matchCriteriaId": "B6D1F873-4348-407C-96E7-63B75827941C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:05_11_f:*:*:*:*:*:*:*", "matchCriteriaId": "3DBE5F6F-BB80-4762-AAB3-D30C6FC8A3B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:05_11_i:*:*:*:*:*:*:*", "matchCriteriaId": "70A57E9D-3FC5-443E-9671-0CF76440A11E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:05_11_j:*:*:*:*:*:*:*", "matchCriteriaId": "4908E99C-D9B1-4EBD-B9F0-74FFED092FAA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:6:*:*:*:*:*:*:*", "matchCriteriaId": "06631C10-25DC-4733-A1D2-F37556978AE7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_00:*:*:*:*:*:*:*", "matchCriteriaId": "D0A012F2-A12D-45D0-95F0-4ECD97FD49AB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_50_b:*:*:*:*:*:*:*", "matchCriteriaId": "C74B3CD8-3D60-472E-97CB-37CF1BDFF371" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_50_c:*:*:*:*:*:*:*", "matchCriteriaId": "72344FDE-11AA-4142-8367-9C76F33DB702" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_51:*:*:*:*:*:*:*", "matchCriteriaId": "7AAF89A0-E719-4273-890E-319EA8B81C23" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_51:*:jichitai:*:*:*:*:*", "matchCriteriaId": "DDCC2769-BE0E-4AB0-8192-C0B9CCA23BF5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_51_b:*:*:*:*:*:*:*", "matchCriteriaId": "FDAC245A-9C8C-4E90-86D7-7EFF829B1F36" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_51_c:*:*:*:*:*:*:*", "matchCriteriaId": "8580D3CE-98F0-4A07-8B92-50609EA333FC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_52:*:*:*:*:*:*:*", "matchCriteriaId": "B344E3DA-A767-4868-B249-873B1A67B016" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_52:*:jichitai:*:*:*:*:*", "matchCriteriaId": "2F6136B7-F035-42DB-920B-D421451AD267" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:06_52_b:*:*:*:*:*:*:*", "matchCriteriaId": "B17C3BFE-8AB7-4FDB-9EEC-F8EE1B566246" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:gold:*:jichitai:*:*:*:*:*", "matchCriteriaId": "F4E726B3-7120-42B3-BC90-CB08BB1FBB9E" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/13321", "source": "cve@mitre.org" }, { "url": "http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.osvdb.org/12153", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/11773", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18278", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/13321", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.osvdb.org/12153", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/11773", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18278", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }