2024-12-08 03:06:42 +00:00

137 lines
3.8 KiB
JSON

{
"id": "CVE-2002-0736",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-08-12T04:00:00.000",
"lastModified": "2024-11-20T23:39:45.220",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft BackOffice 4.0 and 4.5, when configured to be accessible by other systems, allows remote attackers to bypass authentication and access the administrative ASP pages via an HTTP request with an authorization type (auth_type) that is not blank."
},
{
"lang": "es",
"value": "Microsoft BackOffice 4.0 and 4.5, cuando se configura para ser accesible por otros sistemas, permite a los atacantes remotos saltarse la autenticaci\u00f3n y acceder a las p\u00e1ginas administrativas ASP por medio de una petici\u00f3n HTTP con un tipo de autorizaci\u00f3n (auth_type) que no est\u00e1 en blanco."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:backoffice:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60EAD9D1-B3E1-4DE3-9FCE-CBC2BC025561"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:backoffice:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B7299F-C779-4E04-AA33-F91467A9EC37"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0208.html",
"source": "cve@mitre.org"
},
{
"url": "http://support.microsoft.com/support/kb/articles/q316/8/38.asp",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/8862.php",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/4528",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0208.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://support.microsoft.com/support/kb/articles/q316/8/38.asp",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/8862.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/4528",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}