René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

106 lines
3.6 KiB
JSON

{
"id": "CVE-2009-0803",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-03-04T16:30:00.217",
"lastModified": "2009-06-18T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SmoothWall SmoothGuardian, as used in SmoothWall Firewall, NetworkGuardian, and SchoolGuardian 2008, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header."
},
{
"lang": "es",
"value": "SmoothWall SmoothGuardian, usada en SmoothWall Firewall, NetworkGuardian, y SchoolGuardian 2008, cuando el modo de intercepci\u00f3n trasparente est\u00e1 activado, usa la cabecera HTTP Host para determinar el punto final remoto, lo que permite a los atacantes remotos evitar el control de acceso para Flash, Java, Silverlight y propablemente otras tecnolog\u00edas, y posiblemente comunicarse con sitios de intranet retringidos, a trav\u00e9s de p\u00e1ginas web manipuladas lo que causa que el cliente env\u00ede peticiones HTTP con una cabecera Host modificada."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smoothwall:networkguardian:2008:*:*:*:*:*:*:*",
"matchCriteriaId": "125A7E97-7498-4F4B-BF57-72216059F299"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smoothwall:schoolguardian:2008:*:*:*:*:*:*:*",
"matchCriteriaId": "056B0BD8-F842-4844-8954-FE1CFC92C6BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smoothwall:smoothguardian:2008:*:*:*:*:*:*:*",
"matchCriteriaId": "A4285E19-02DA-4A75-BE6F-F46769FD8A0A"
}
]
}
]
}
],
"references": [
{
"url": "http://www.kb.cert.org/vuls/id/435052",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/MAPG-7M6SM7",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/33858",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}