mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
112 lines
3.6 KiB
JSON
112 lines
3.6 KiB
JSON
{
|
|
"id": "CVE-2005-1753",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-12-31T05:00:00.000",
|
|
"lastModified": "2024-11-20T23:58:03.410",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [
|
|
{
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"tags": [
|
|
"disputed"
|
|
]
|
|
}
|
|
],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to view other users' e-mail attachments via a direct request to /mailboxesdir/username@domainname. NOTE: Sun and Apache dispute this issue. Sun states: \"The report makes references to source code and files that do not exist in the mentioned products."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:javamail:1.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04D05527-847C-4630-9667-F41DD78917DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:javamail:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "398E46A2-D9BF-4AF6-B068-A28233B76ECC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:javamail:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9EB65E60-8259-4C08-AC3B-7D3FE51F42F0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=111697083812367&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://tomcat.apache.org/security-5.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=111697083812367&w=2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://tomcat.apache.org/security-5.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
],
|
|
"vendorComments": [
|
|
{
|
|
"organization": "Red Hat",
|
|
"comment": "We do not believe this is a security issue; this is a deliberate circumvention of the Javamail API. The Javamail API provides a comprehensive and secure method to retrieve mail. In this example, the author retreives the message directly from the mail directory on the\nfilesystem. Even if the user insists on using this incorrect way of accessing mail, then the\npermissions set by the dovecot and tomcat packages are enough to protect against\ndirect access to most of the files listed in the bug report.",
|
|
"lastModified": "2006-08-30T00:00:00"
|
|
}
|
|
]
|
|
} |