René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

104 lines
2.7 KiB
JSON

{
"id": "CVE-2005-0316",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-01-28T05:00:00.000",
"lastModified": "2017-07-11T01:32:13.453",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webwasher:webwasher_classic:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BDD5629F-8E42-4A68-B04A-C4B35DDFDE34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webwasher:webwasher_classic:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B24638-55F6-4366-8EE2-1F0FCE1AD3AC"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=110693045507245&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1013036",
"source": "cve@mitre.org"
},
{
"url": "http://www.oliverkarow.de/research/WebWasherCONNECT.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/12394",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19144",
"source": "cve@mitre.org"
}
]
}