2024-12-08 03:06:42 +00:00

149 lines
3.9 KiB
JSON

{
"id": "CVE-2005-0316",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-01-28T05:00:00.000",
"lastModified": "2024-11-20T23:54:52.473",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webwasher:webwasher_classic:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BDD5629F-8E42-4A68-B04A-C4B35DDFDE34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webwasher:webwasher_classic:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B24638-55F6-4366-8EE2-1F0FCE1AD3AC"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=110693045507245&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/14058",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1013036",
"source": "cve@mitre.org"
},
{
"url": "http://www.oliverkarow.de/research/WebWasherCONNECT.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/12394",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19144",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=110693045507245&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/14058",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1013036",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.oliverkarow.de/research/WebWasherCONNECT.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/12394",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19144",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}