CVE-2002-0933
CVSS7.5
发布时间 :2002-10-04 00:00:00
修订时间 :2008-09-05 16:29:20
NMCOS    

[原文]Datalex PLC BookIt! Consumer before 2.2 stores usernames and passwords in plaintext in a cookie, which could allow remote attackers to gain privileges via Cross-site scripting or sniffing attacks.


[CNNVD]Datalex Bookit! Consumer纯文本认证证书漏洞(CNNVD-200210-101)

        Datalex PLC BookIt! Consumer 2.2之前的版本将用户名和密码存储在纯文本cookie中,远程攻击者可以利用该漏洞借助跨站脚本或数据盗窃攻击获取权限。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0933
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0933
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-101
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4972
(VENDOR_ADVISORY)  BID  4972
http://www.iss.net/security_center/static/9316.php
(VENDOR_ADVISORY)  XF  bookit-plaintext-passwords(9316)
http://archives.neohapsis.com/archives/bugtraq/2002-06/0063.html
(UNKNOWN)  BUGTRAQ  20020610 Datalex BookIt! Consumer Password Vulnerabilities

- 漏洞信息

Datalex Bookit! Consumer纯文本认证证书漏洞
高危 跨站脚本
2002-10-04 00:00:00 2005-10-20 00:00:00
远程  
        Datalex PLC BookIt! Consumer 2.2之前的版本将用户名和密码存储在纯文本cookie中,远程攻击者可以利用该漏洞借助跨站脚本或数据盗窃攻击获取权限。

- 公告与补丁

        This issue has been addressed in versions 2.2 and later.

- 漏洞信息

14466
Datalex PLC BookIt! Consumer Authentication Credential Cookie Cleartext Storage
Cryptographic, Information Disclosure
Loss of Confidentiality

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-06-10 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Datalex Bookit! Consumer Plaintext Authentication Credentials Vulnerability
Design Error 4972
Yes No
2002-06-10 12:00:00 2009-07-11 01:56:00
Discovery of this issue is credited to Michael Sutton <msutton@idefense.com>.

- 受影响的程序版本

Datalex Bookit! Consumer 2.0
Datalex Bookit! Consumer 2.4
Datalex Bookit! Consumer 2.3
Datalex Bookit! Consumer 2.2

- 不受影响的程序版本

Datalex Bookit! Consumer 2.4
Datalex Bookit! Consumer 2.3
Datalex Bookit! Consumer 2.2

- 漏洞讨论

Datalex Bookit! Consumer cookies contain plaintext authentication credentials. Additionally, due to use of the CGI GET method, plaintext authentication credentials are sent in CGI parameters. This becomes an issue if the authentication credentials ever become exposed to an attacker.

- 漏洞利用

There is no exploit required.

- 解决方案

This issue has been addressed in versions 2.2 and later.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站