René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

125 lines
3.9 KiB
JSON

{
"id": "CVE-2005-2963",
"sourceIdentifier": "security@debian.org",
"published": "2005-10-13T21:02:00.000",
"lastModified": "2017-07-11T01:33:03.767",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The mod_auth_shadow module 1.0 through 1.5 and 2.0 for Apache with AuthShadow enabled uses shadow authentication for all locations that use the require group directive, even when other authentication mechanisms are specified, which might allow remote authenticated users to bypass security restrictions."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "749F9325-2253-420A-941C-BD56491E127B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "84593AE8-E873-4C4F-99F0-81037B5BEC79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "43025F27-302F-41E4-9DD3-99AFAF94B758"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5BE018-681C-47A9-B911-2A9DAD07096B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEBF877-4EB6-4E4F-BF8B-A172D2BA3981"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F30540C5-133A-4B84-9F6C-576AD87CF6F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58AE41C1-D2C6-406B-89D0-C8B3408A0D53"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323789",
"source": "security@debian.org"
},
{
"url": "http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:200",
"source": "security@debian.org"
},
{
"url": "http://www.debian.org/security/2005/dsa-844",
"source": "security@debian.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/15224",
"source": "security@debian.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22520",
"source": "security@debian.org"
}
]
}