CVE-2003-0399
CVSS6.4
发布时间 :2003-07-02 00:00:00
修订时间 :2016-10-17 22:33:26
NMCOS    

[原文]Vignette StoryServer 4 and 5, Vignette V/5, and possibly other versions allows remote attackers to perform unauthorized SELECT queries by setting the vgn_creds cookie to an arbitrary value and directly accessing the save template.


[CNNVD]Vignette未认证传统工具访问漏洞(CNNVD-200307-002)

        Vignette StoryServer 版本4和版本5,以及Vignette V/5,可能还包括其他版本存在漏洞。远程攻击者可以通过设置任意值的vgn_creds cookie执行未认证SELECT查询,并且可以直接访问保存模板。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:vignette:vignette:5.0
cpe:/a:vignette:storyserver:4.1
cpe:/a:vignette:storyserver:5.0
cpe:/a:vignette:storyserver:4.0
cpe:/a:vignette:content_suite:7.0
cpe:/a:vignette:content_suite:6.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0399
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0399
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200307-002
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=105405874325673&w=2
(UNKNOWN)  BUGTRAQ  20030526 S21SEC-017 - Vignette /vgn/legacy/save SQL access
http://www.iss.net/security_center/static/12076.php
(VENDOR_ADVISORY)  XF  vignette-save-obtain-information(12076)
http://www.s21sec.com/es/avisos/s21sec-017-en.txt
(VENDOR_ADVISORY)  MISC  http://www.s21sec.com/es/avisos/s21sec-017-en.txt
http://www.securityfocus.com/bid/7683
(UNKNOWN)  BID  7683

- 漏洞信息

Vignette未认证传统工具访问漏洞
中危 访问验证错误
2003-07-02 00:00:00 2005-10-20 00:00:00
远程  
        Vignette StoryServer 版本4和版本5,以及Vignette V/5,可能还包括其他版本存在漏洞。远程攻击者可以通过设置任意值的vgn_creds cookie执行未认证SELECT查询,并且可以直接访问保存模板。

- 公告与补丁

        The vendor has posted a response to this issue at the following location:
        http://support.vignette.com/VOLSS/KB/View/1,,5557,00.html
        It should be noted that only existing Vignette customers and partners are able to access the above link.
        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息

4909
Vignette StoryServer save Template SQL Access
Remote / Network Access Input Manipulation, Misconfiguration
Loss of Confidentiality
Exploit Public

- 漏洞描述

Vignette and StoryServer products contain a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered due to a lack of validation of user credentials on the Vignette Legacy Tool, allowing an attacker to inject arbitrary SQL SELECT statements over any SQL table accesible from the Vignette user, resulting in a loss of confidentiality.

- 时间线

2003-05-26 Unknow
Unknow Unknow

- 解决方案

For an upgrade or patch information, Vignette costumers should contact Technical Support. It is also possible to correct the flaw by implementing the following workaround(s): Insert a [ NEEDS LOGIN ] directive in the top of the source code for the /vgn/legacy/save template.

- 相关参考

- 漏洞作者

- 漏洞信息

Vignette Unauthorized Legacy Tool Access Vulnerability
Access Validation Error 7683
Yes No
2003-05-26 12:00:00 2009-07-11 10:06:00
Discovery of this issue is credited to S21SEC <vul-serv@s21sec.com>.

- 受影响的程序版本

Vignette Vignette V/5
Vignette V6 Content Suite
Vignette StoryServer 5.0
Vignette StoryServer 4.1
Vignette StoryServer 4.0
Vignette Content Suite V7

- 漏洞讨论

Vignette does not sufficiently restrict access to the Legacy Tool application. Unauthorized remote users may use this tool to execute database queries.

** The vendor has stated that the "Legacy records save" template is a sample template that cannot be launched to a live CDS unless explicitly specified.

- 漏洞利用

There is no exploit required.

- 解决方案

The vendor has posted a response to this issue at the following location:

http://support.vignette.com/VOLSS/KB/View/1,,5557,00.html

It should be noted that only existing Vignette customers and partners are able to access the above link.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站