René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

98 lines
2.5 KiB
JSON

{
"id": "CVE-2003-0097",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-03-03T05:00:00.000",
"lastModified": "2018-10-30T16:25:35.387",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unknown vulnerability in CGI module for PHP 4.3.0 allows attackers to access arbitrary files as the PHP user, and possibly execute PHP code, by bypassing the CGI force redirect settings (cgi.force_redirect or --enable-force-cgi-redirect)."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63190D9B-7958-4B93-87C6-E7D5A572F6DC"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=104550977011668&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=104567042700840&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=104567137502557&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/11343.php",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/6875",
"source": "cve@mitre.org"
},
{
"url": "http://www.slackware.com/changelog/current.php?cpu=i386",
"source": "cve@mitre.org"
}
]
}