2024-07-14 02:06:08 +00:00

166 lines
5.0 KiB
JSON

{
"id": "CVE-2003-0042",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-02-07T05:00:00.000",
"lastModified": "2017-07-11T01:29:27.180",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character."
},
{
"lang": "es",
"value": "Jakarta Tomcat antes de 3.3.1a, cuando se usa con JDK 1.3.1 o anterior, permite a atacantes remotos listar directorios incluso cuando un index.html u otro fichero presente mediante una URL conteniendo un car\u00e1cter nulo."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFF8D91-80A2-454A-8B44-A5A889002692"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC42876-65AD-476A-8B62-25D4E15D1BB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "724A8FF9-8089-4302-8200-08987A712988"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3F97DDB7-E32B-422F-8AEA-07C75DEAD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7079F63C-7CA8-4909-A9C8-45C4C1C1C186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EC829C8E-1061-4F62-BA4B-FE5C7F11F209"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "143BA75E-A186-47EF-A18C-B1A1A1F61C00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C0CDF9E1-9412-450E-B1D4-438F128FFF9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "32561F50-6385-4D71-AFAC-3D2F8DB55A4B"
}
]
}
]
}
],
"references": [
{
"url": "http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=104394568616290&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/7972",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/7977",
"source": "cve@mitre.org"
},
{
"url": "http://www.ciac.org/ciac/bulletins/n-060.shtml",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2003/dsa-246",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/advisories/5111",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/6721",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11194",
"source": "cve@mitre.org"
}
]
}