Vulnerabilites related to caucho - resin
CVE-2012-2965 (GCVE-0-2012-2965)
Vulnerability from cvelistv5
Published
2012-08-12 16:00
Modified
2024-09-16 20:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Caucho Quercus, as distributed in Resin before 4.0.29, does not properly handle unspecified characters in the names of variables, which has unknown impact and remote attack vectors, related to an "HTTP Parameter Contamination" issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, does not properly handle unspecified characters in the names of variables, which has unknown impact and remote attack vectors, related to an \"HTTP Parameter Contamination\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-12T16:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-2965", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, does not properly handle unspecified characters in the names of variables, which has unknown impact and remote attack vectors, related to an \"HTTP Parameter Contamination\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#309979", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/309979" }, { "name": "http://en.securitylab.ru/lab/", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/" }, { "name": "http://en.securitylab.ru/lab/PT-2012-05", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "name": "http://caucho.com/resin-4.0/changes/changes.xtp", "refsource": "MISC", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-2965", "datePublished": "2012-08-12T16:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T20:52:28.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2969 (GCVE-0-2012-2969)
Vulnerability from cvelistv5
Published
2012-08-12 16:00
Modified
2024-09-17 00:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to bypass intended restrictions on filename extensions for created files via a %00 sequence in a pathname within an HTTP request.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to bypass intended restrictions on filename extensions for created files via a %00 sequence in a pathname within an HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-12T16:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-2969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to bypass intended restrictions on filename extensions for created files via a %00 sequence in a pathname within an HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#309979", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/309979" }, { "name": "http://en.securitylab.ru/lab/", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/" }, { "name": "http://en.securitylab.ru/lab/PT-2012-05", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "name": "http://caucho.com/resin-4.0/changes/changes.xtp", "refsource": "MISC", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-2969", "datePublished": "2012-08-12T16:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-17T00:16:39.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44138 (GCVE-0-2021-44138)
Vulnerability from cvelistv5
Published
2022-04-04 12:03
Modified
2024-08-04 04:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:23.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/maybe-why-not/reponame/issues/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-04T12:03:05", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/maybe-why-not/reponame/issues/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-44138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/maybe-why-not/reponame/issues/2", "refsource": "MISC", "url": "https://github.com/maybe-why-not/reponame/issues/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44138", "datePublished": "2022-04-04T12:03:05", "dateReserved": "2021-11-22T00:00:00", "dateUpdated": "2024-08-04T04:17:23.598Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2966 (GCVE-0-2012-2966)
Vulnerability from cvelistv5
Published
2012-08-12 16:00
Modified
2024-09-16 22:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Caucho Quercus, as distributed in Resin before 4.0.29, overwrites entries in the SERVER superglobal array on the basis of POST parameters, which has unspecified impact and remote attack vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, overwrites entries in the SERVER superglobal array on the basis of POST parameters, which has unspecified impact and remote attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-12T16:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-2966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, overwrites entries in the SERVER superglobal array on the basis of POST parameters, which has unspecified impact and remote attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#309979", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/309979" }, { "name": "http://en.securitylab.ru/lab/", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/" }, { "name": "http://en.securitylab.ru/lab/PT-2012-05", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "name": "http://caucho.com/resin-4.0/changes/changes.xtp", "refsource": "MISC", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-2966", "datePublished": "2012-08-12T16:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T22:14:49.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2967 (GCVE-0-2012-2967)
Vulnerability from cvelistv5
Published
2012-08-12 16:00
Modified
2024-09-17 00:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Caucho Quercus, as distributed in Resin before 4.0.29, does not properly implement the == (equals sign equals sign) operator for comparisons, which has unspecified impact and context-dependent attack vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, does not properly implement the == (equals sign equals sign) operator for comparisons, which has unspecified impact and context-dependent attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-12T16:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-2967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, does not properly implement the == (equals sign equals sign) operator for comparisons, which has unspecified impact and context-dependent attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#309979", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/309979" }, { "name": "http://en.securitylab.ru/lab/", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/" }, { "name": "http://en.securitylab.ru/lab/PT-2012-05", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "name": "http://caucho.com/resin-4.0/changes/changes.xtp", "refsource": "MISC", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-2967", "datePublished": "2012-08-12T16:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-17T00:41:22.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2087 (GCVE-0-2010-2087)
Vulnerability from cvelistv5
Published
2010-05-27 18:32
Modified
2024-09-17 01:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Oracle Mojarra 1.2_14 and 2.0.2, as used in IBM WebSphere Application Server, Caucho Resin, and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:17:14.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-001.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Oracle Mojarra 1.2_14 and 2.0.2, as used in IBM WebSphere Application Server, Caucho Resin, and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-05-27T18:32:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-001.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle Mojarra 1.2_14 and 2.0.2, as used in IBM WebSphere Application Server, Caucho Resin, and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-001.txt", "refsource": "MISC", "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-001.txt" }, { "name": "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf", "refsource": "MISC", "url": "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2087", "datePublished": "2010-05-27T18:32:00Z", "dateReserved": "2010-05-27T00:00:00Z", "dateUpdated": "2024-09-17T01:02:09.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2968 (GCVE-0-2012-2968)
Vulnerability from cvelistv5
Published
2012-08-12 16:00
Modified
2024-09-17 00:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.388Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-12T16:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#309979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "tags": [ "x_refsource_MISC" ], "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-2968", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#309979", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/309979" }, { "name": "http://en.securitylab.ru/lab/", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/" }, { "name": "http://en.securitylab.ru/lab/PT-2012-05", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "name": "http://caucho.com/resin-4.0/changes/changes.xtp", "refsource": "MISC", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-2968", "datePublished": "2012-08-12T16:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-17T00:50:54.884Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0281 (GCVE-0-2004-0281)
Vulnerability from cvelistv5
Published
2004-03-18 05:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Caucho Technology Resin 2.1.12 allows remote attackers to gain sensitive information and view the contents of the /WEB-INF/ directory via an HTTP request for "WEB-INF..", which is equivalent to "WEB-INF" in Windows.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "9617", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9617" }, { "name": "resin-dotdot-directory-traversal(15087)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15087" }, { "name": "20040205 Apache Http Server Reveals Script Source Code to Remote Users And Any Users Can Access Resin Forbidden Directory (\"/WEB-INF/\")", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107635084830547\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Caucho Technology Resin 2.1.12 allows remote attackers to gain sensitive information and view the contents of the /WEB-INF/ directory via an HTTP request for \"WEB-INF..\", which is equivalent to \"WEB-INF\" in Windows." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "9617", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9617" }, { "name": "resin-dotdot-directory-traversal(15087)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15087" }, { "name": "20040205 Apache Http Server Reveals Script Source Code to Remote Users And Any Users Can Access Resin Forbidden Directory (\"/WEB-INF/\")", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107635084830547\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0281", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Caucho Technology Resin 2.1.12 allows remote attackers to gain sensitive information and view the contents of the /WEB-INF/ directory via an HTTP request for \"WEB-INF..\", which is equivalent to \"WEB-INF\" in Windows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "9617", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9617" }, { "name": "resin-dotdot-directory-traversal(15087)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15087" }, { "name": "20040205 Apache Http Server Reveals Script Source Code to Remote Users And Any Users Can Access Resin Forbidden Directory (\"/WEB-INF/\")", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107635084830547\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0281", "datePublished": "2004-03-18T05:00:00", "dateReserved": "2004-03-17T00:00:00", "dateUpdated": "2024-08-08T00:10:03.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2462 (GCVE-0-2008-2462)
Vulnerability from cvelistv5
Published
2008-06-30 22:00
Modified
2024-08-07 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:05:29.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-1930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1930/references" }, { "name": "VU#305208", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/305208" }, { "name": "1020372", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020372" }, { "name": "caucho-resin-file-xss(43367)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43367" }, { "name": "29948", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29948" }, { "name": "30845", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205%2C%202007" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "ADV-2008-1930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1930/references" }, { "name": "VU#305208", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/305208" }, { "name": "1020372", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020372" }, { "name": "caucho-resin-file-xss(43367)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43367" }, { "name": "29948", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29948" }, { "name": "30845", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205%2C%202007" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2008-2462", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-1930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1930/references" }, { "name": "VU#305208", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/305208" }, { "name": "1020372", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020372" }, { "name": "caucho-resin-file-xss(43367)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43367" }, { "name": "29948", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29948" }, { "name": "30845", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30845" }, { "name": "http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205,%202007", "refsource": "CONFIRM", "url": "http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205,%202007" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2008-2462", "datePublished": "2008-06-30T22:00:00", "dateReserved": "2008-05-28T00:00:00", "dateUpdated": "2024-08-07T09:05:29.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2032 (GCVE-0-2010-2032)
Vulnerability from cvelistv5
Published
2010-05-24 19:00
Modified
2024-08-07 02:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in resin-admin/digest.php in Caucho Technology Resin Professional 3.1.5, 3.1.10, 4.0.6, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via the (1) digest_realm or (2) digest_username parameters. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:17:14.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-1201", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1201" }, { "name": "40251", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40251" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.org/1005-exploits/cauchoresin312-xss.txt" }, { "name": "caucho-resin-digest-xss(58733)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58733" }, { "name": "20100518 Caucho Technology Resin digest.php Cross Site Scripting Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511341/100/0/threaded" }, { "name": "39839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in resin-admin/digest.php in Caucho Technology Resin Professional 3.1.5, 3.1.10, 4.0.6, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via the (1) digest_realm or (2) digest_username parameters. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2010-1201", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1201" }, { "name": "40251", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40251" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.org/1005-exploits/cauchoresin312-xss.txt" }, { "name": "caucho-resin-digest-xss(58733)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58733" }, { "name": "20100518 Caucho Technology Resin digest.php Cross Site Scripting Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511341/100/0/threaded" }, { "name": "39839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39839" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in resin-admin/digest.php in Caucho Technology Resin Professional 3.1.5, 3.1.10, 4.0.6, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via the (1) digest_realm or (2) digest_username parameters. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-1201", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1201" }, { "name": "40251", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40251" }, { "name": "http://packetstormsecurity.org/1005-exploits/cauchoresin312-xss.txt", "refsource": "MISC", "url": "http://packetstormsecurity.org/1005-exploits/cauchoresin312-xss.txt" }, { "name": "caucho-resin-digest-xss(58733)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58733" }, { "name": "20100518 Caucho Technology Resin digest.php Cross Site Scripting Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511341/100/0/threaded" }, { "name": "39839", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39839" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2032", "datePublished": "2010-05-24T19:00:00", "dateReserved": "2010-05-24T00:00:00", "dateUpdated": "2024-08-07T02:17:14.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2966 (GCVE-0-2014-2966)
Vulnerability from cvelistv5
Published
2014-07-26 15:00
Modified
2024-08-06 10:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The ISO-8859-1 encoder in Resin Pro before 4.0.40 does not properly perform Unicode transformations, which allows remote attackers to bypass intended text restrictions via crafted characters, as demonstrated by bypassing an XSS protection mechanism.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:28:46.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#162308", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/162308" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://caucho.com/products/resin/download#download" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The ISO-8859-1 encoder in Resin Pro before 4.0.40 does not properly perform Unicode transformations, which allows remote attackers to bypass intended text restrictions via crafted characters, as demonstrated by bypassing an XSS protection mechanism." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-26T14:57:00", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#162308", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/162308" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://caucho.com/products/resin/download#download" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2014-2966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ISO-8859-1 encoder in Resin Pro before 4.0.40 does not properly perform Unicode transformations, which allows remote attackers to bypass intended text restrictions via crafted characters, as demonstrated by bypassing an XSS protection mechanism." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#162308", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/162308" }, { "name": "http://caucho.com/products/resin/download#download", "refsource": "CONFIRM", "url": "http://caucho.com/products/resin/download#download" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2014-2966", "datePublished": "2014-07-26T15:00:00", "dateReserved": "2014-04-21T00:00:00", "dateUpdated": "2024-08-06T10:28:46.194Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-08-12 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to bypass intended restrictions on filename extensions for created files via a %00 sequence in a pathname within an HTTP request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB62BA5C-7827-40AA-9D83-E4AEA482395B", "versionEndIncluding": "4.0.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4A9A59D-6C5A-4917-857E-D183B6982EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "457E68AD-E7F1-4845-9CBE-0FA4D8A8D946", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A334508B-849A-45D3-B83D-E0AE5AB4A601", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "60930A08-2692-4809-89B7-3B2FB5CEF7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "85003E89-F293-4846-AA6C-047FD3178333", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C34209E9-E33F-49C7-A298-61EEBAE77C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD3720FA-6136-48D0-82B8-513EFC26D4A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "08F7C559-7B3D-44E2-8A22-58FA021E3EC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B47B8CB3-C2ED-4E37-84DE-8018114CFE6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "54379312-A5E3-41DA-A50C-554C8787FDCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3AF6E9A6-5F37-4443-8D64-9C173DABDCA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F9759471-88B7-43D8-81AA-DFC74AE49563", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "70210B6F-B3E1-41F7-883C-4A449A480B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "CE141992-980B-4021-80B1-694DB3F21D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2079B923-2976-46BB-A28F-674EAFCCA426", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "21AEF4E3-E4AE-4053-A332-D8773F7BEC38", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "EACB10DA-9825-4D86-AD90-07CE961915A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9F12E529-14C8-4251-855D-88E3DC3BD71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "DD14F784-48E0-4F84-8F81-6AEC1A112249", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AEEF7D28-7E47-458D-9366-A916032F0594", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "8E0C1155-4E40-4597-96CF-F6BCDF2C979F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "E0651EE5-BFB1-41C7-B1F4-D61A19D98EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "31C49426-91D0-4505-88FD-19E216333C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.snap:*:*:*:*:*:*:*", "matchCriteriaId": "ED74BDDE-5978-4F48-A460-D0A7BD54154C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B781357-4F5F-45E9-B2AC-8C91C7BBD759", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.1:beta:*:*:*:*:*:*", "matchCriteriaId": "D18C7FAC-3AC3-461A-B94E-4C4E516F79EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.2:beta:*:*:*:*:*:*", "matchCriteriaId": "D6E82173-38B3-44F7-9B21-BD176AD401AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C709DB7B-64BC-4CAC-9900-86B4B8C65D0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "B19E7FA9-48A2-452E-9A88-6DDCFA5F04EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1C6D56BA-0115-4F94-900F-C7246CBAFB5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2A6766F1-DAEF-4B46-A437-70A0DA796CB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0C87B844-CB4F-432C-BB95-0BFFE21F70FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7AE0B374-65DC-41A1-BD26-484BEDCC208D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "318C85EA-0F00-4306-887F-9A2111C45736", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3348884-8D55-4A51-BB9B-94339A20F706", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD4A98DE-00B4-4211-A4D1-D88DA34E3832", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "04D7A448-ECCA-48D8-BBF1-ABBF2F1FD791", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "34C6864E-414B-464E-BC17-36B554A5EE92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "9CBB81A1-3CDD-4890-B19B-C4E4DFC7FC62", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "AB00A312-45F7-4C66-AAF5-C952DB8FFEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "75B7A1C6-AF66-4CF2-A2D9-3D9E0F1B78B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "1E4E9AF1-F863-4319-BB96-9E6CAA8FAB92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "976D2F97-5EA3-45EC-91C2-33B8081F7260", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "D43ABA6E-5061-498C-A68C-44C6942DD96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "6CB83B0F-A221-4CDA-83FC-CC8FE740AE7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "ED9ACA71-58A4-4506-83E6-36E8C09DF1E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "859A606A-3327-4884-B7F4-769B32400D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "93A3F13E-272A-4FDA-AA54-BD75BE78C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D4BE4593-C422-46D1-8F4E-293C508B5D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3791E1F7-8776-48DE-B918-18DB08D6F652", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F397825-AA09-4F34-821C-B567B04FCB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "4F18F7E1-DB6D-4FA8-81C2-05EC23DE46D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "88CD809F-AFC5-40CD-B709-E797174FA5CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9FF07CD8-6479-464E-A3CB-0F680C34461C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0146DE06-1B29-4344-A6A6-34D627E407F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D56CE194-BC17-40B7-8775-DD267731B9D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "B9EF1405-8B4E-4314-8A9D-19B3CAF15229", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "5FD16B09-AC60-4296-A523-94F960985A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1152C994-7446-43F8-90D7-4298F81C5454", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "32D0F9D9-84D7-4F04-8432-9560BBC8B529", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E04F2867-324D-451D-ABB9-A74678110777", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "89500B66-3459-46E9-A0EC-D32AF212EAD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "80B7FCA8-6C17-4C5B-98A0-C44B5338D84B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "801FA247-802F-4387-9A56-50ACE7440599", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E02F8DF-0680-47DD-9773-80CA8BBA9947", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "82BCE2FC-EE12-4B58-8B26-1EBAD3614A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "89008076-FA94-430E-9AD5-8F53D5114421", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BA9823D-9330-4E05-803B-C336B43FB0C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "512714F0-E392-472F-A520-D3EF690BB2CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5ACB49A3-9A0B-4C4C-949B-B569C2049B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "3EBF56AD-F93B-4370-A850-7046DE36591A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "DAFD4305-8A81-4C31-B97A-06F063A16827", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB7697BE-FF95-46DF-9DD1-5D114B0151BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "3D3ABF12-D4C0-4D0A-8FBD-13F596B5CDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "BE6BE8DB-6CCF-48CC-8992-546BBEE56050", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "7A9E8929-07DE-4525-95C3-24C63FB77AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF191346-0D21-4773-B0BF-2FBAEC78731C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "76C26F87-0FD8-4252-8EE6-2D34FC42D441", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "41325FF5-F3FC-4F2E-8EA6-41EEAA8AC724", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "70990ADF-5ABE-4C69-8ECA-F725119F0C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "6CAA2934-AA3A-4AD3-ACCD-96B66BAC1C73", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "39C70610-2570-4DE1-9FAC-971C5234208E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "6A70AAE6-EB10-4544-BFD1-6679D86D8FC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "0813C483-FDFD-4CA0-AEB5-110959D27DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "82A5CBB1-F008-473F-973D-C77FF7ACE18D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "7E1F3562-660A-46D8-AF58-F30E37C71C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "14DA8A16-B6DB-443C-8A6E-8055DA2AA38F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to bypass intended restrictions on filename extensions for created files via a %00 sequence in a pathname within an HTTP request." }, { "lang": "es", "value": "Caucho Quercus, tal y como se distribuye en Resin antes de v4.0.29, permite a atacantes remotos eludir las restricciones previstas en las extensiones de archivos para archivos creados con una secuencia 00% en la ruta de acceso dentro de una petici\u00f3n HTTP.\r\n" } ], "id": "CVE-2012-2969", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-12T16:55:01.293", "references": [ { "source": "cret@cert.org", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-04 13:15
Modified
2024-11-21 06:30
Severity ?
Summary
There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/maybe-why-not/reponame/issues/2 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/maybe-why-not/reponame/issues/2 | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A24BD4-5628-4A51-95B6-D219436A46EA", "versionEndIncluding": "4.0.56", "versionStartIncluding": "4.0.52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de salto de directorio en Caucho Resin, distribuido en Resin versiones 4.0.52 - 4.0.56, que permite a atacantes remotos leer archivos en directorios arbitrarios por medio de un ; en un nombre de ruta dentro de una petici\u00f3n HTTP" } ], "id": "CVE-2021-44138", "lastModified": "2024-11-21T06:30:25.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-04T13:15:07.590", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/maybe-why-not/reponame/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/maybe-why-not/reponame/issues/2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-12 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB62BA5C-7827-40AA-9D83-E4AEA482395B", "versionEndIncluding": "4.0.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4A9A59D-6C5A-4917-857E-D183B6982EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "457E68AD-E7F1-4845-9CBE-0FA4D8A8D946", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A334508B-849A-45D3-B83D-E0AE5AB4A601", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "60930A08-2692-4809-89B7-3B2FB5CEF7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "85003E89-F293-4846-AA6C-047FD3178333", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C34209E9-E33F-49C7-A298-61EEBAE77C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD3720FA-6136-48D0-82B8-513EFC26D4A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "08F7C559-7B3D-44E2-8A22-58FA021E3EC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B47B8CB3-C2ED-4E37-84DE-8018114CFE6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "54379312-A5E3-41DA-A50C-554C8787FDCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3AF6E9A6-5F37-4443-8D64-9C173DABDCA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F9759471-88B7-43D8-81AA-DFC74AE49563", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "70210B6F-B3E1-41F7-883C-4A449A480B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "CE141992-980B-4021-80B1-694DB3F21D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2079B923-2976-46BB-A28F-674EAFCCA426", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "21AEF4E3-E4AE-4053-A332-D8773F7BEC38", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "EACB10DA-9825-4D86-AD90-07CE961915A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9F12E529-14C8-4251-855D-88E3DC3BD71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "DD14F784-48E0-4F84-8F81-6AEC1A112249", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AEEF7D28-7E47-458D-9366-A916032F0594", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "8E0C1155-4E40-4597-96CF-F6BCDF2C979F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "E0651EE5-BFB1-41C7-B1F4-D61A19D98EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "31C49426-91D0-4505-88FD-19E216333C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.snap:*:*:*:*:*:*:*", "matchCriteriaId": "ED74BDDE-5978-4F48-A460-D0A7BD54154C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B781357-4F5F-45E9-B2AC-8C91C7BBD759", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.1:beta:*:*:*:*:*:*", "matchCriteriaId": "D18C7FAC-3AC3-461A-B94E-4C4E516F79EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.2:beta:*:*:*:*:*:*", "matchCriteriaId": "D6E82173-38B3-44F7-9B21-BD176AD401AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C709DB7B-64BC-4CAC-9900-86B4B8C65D0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "B19E7FA9-48A2-452E-9A88-6DDCFA5F04EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1C6D56BA-0115-4F94-900F-C7246CBAFB5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2A6766F1-DAEF-4B46-A437-70A0DA796CB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0C87B844-CB4F-432C-BB95-0BFFE21F70FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7AE0B374-65DC-41A1-BD26-484BEDCC208D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "318C85EA-0F00-4306-887F-9A2111C45736", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3348884-8D55-4A51-BB9B-94339A20F706", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD4A98DE-00B4-4211-A4D1-D88DA34E3832", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "04D7A448-ECCA-48D8-BBF1-ABBF2F1FD791", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "34C6864E-414B-464E-BC17-36B554A5EE92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "9CBB81A1-3CDD-4890-B19B-C4E4DFC7FC62", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "AB00A312-45F7-4C66-AAF5-C952DB8FFEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "75B7A1C6-AF66-4CF2-A2D9-3D9E0F1B78B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "1E4E9AF1-F863-4319-BB96-9E6CAA8FAB92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "976D2F97-5EA3-45EC-91C2-33B8081F7260", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "D43ABA6E-5061-498C-A68C-44C6942DD96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "6CB83B0F-A221-4CDA-83FC-CC8FE740AE7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "ED9ACA71-58A4-4506-83E6-36E8C09DF1E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "859A606A-3327-4884-B7F4-769B32400D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "93A3F13E-272A-4FDA-AA54-BD75BE78C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D4BE4593-C422-46D1-8F4E-293C508B5D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3791E1F7-8776-48DE-B918-18DB08D6F652", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F397825-AA09-4F34-821C-B567B04FCB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "4F18F7E1-DB6D-4FA8-81C2-05EC23DE46D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "88CD809F-AFC5-40CD-B709-E797174FA5CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9FF07CD8-6479-464E-A3CB-0F680C34461C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0146DE06-1B29-4344-A6A6-34D627E407F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D56CE194-BC17-40B7-8775-DD267731B9D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "B9EF1405-8B4E-4314-8A9D-19B3CAF15229", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "5FD16B09-AC60-4296-A523-94F960985A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1152C994-7446-43F8-90D7-4298F81C5454", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "32D0F9D9-84D7-4F04-8432-9560BBC8B529", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E04F2867-324D-451D-ABB9-A74678110777", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "89500B66-3459-46E9-A0EC-D32AF212EAD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "80B7FCA8-6C17-4C5B-98A0-C44B5338D84B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "801FA247-802F-4387-9A56-50ACE7440599", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E02F8DF-0680-47DD-9773-80CA8BBA9947", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "82BCE2FC-EE12-4B58-8B26-1EBAD3614A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "89008076-FA94-430E-9AD5-8F53D5114421", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BA9823D-9330-4E05-803B-C336B43FB0C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "512714F0-E392-472F-A520-D3EF690BB2CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5ACB49A3-9A0B-4C4C-949B-B569C2049B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "3EBF56AD-F93B-4370-A850-7046DE36591A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "DAFD4305-8A81-4C31-B97A-06F063A16827", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB7697BE-FF95-46DF-9DD1-5D114B0151BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "3D3ABF12-D4C0-4D0A-8FBD-13F596B5CDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "BE6BE8DB-6CCF-48CC-8992-546BBEE56050", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "7A9E8929-07DE-4525-95C3-24C63FB77AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF191346-0D21-4773-B0BF-2FBAEC78731C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "76C26F87-0FD8-4252-8EE6-2D34FC42D441", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "41325FF5-F3FC-4F2E-8EA6-41EEAA8AC724", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "70990ADF-5ABE-4C69-8ECA-F725119F0C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "6CAA2934-AA3A-4AD3-ACCD-96B66BAC1C73", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "39C70610-2570-4DE1-9FAC-971C5234208E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "6A70AAE6-EB10-4544-BFD1-6679D86D8FC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "0813C483-FDFD-4CA0-AEB5-110959D27DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "82A5CBB1-F008-473F-973D-C77FF7ACE18D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "7E1F3562-660A-46D8-AF58-F30E37C71C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "14DA8A16-B6DB-443C-8A6E-8055DA2AA38F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request." }, { "lang": "es", "value": "Vulnerabilidad de directorio transversal en Caucho Quercus, distribuido como (Resin) anterior a v4.0.29, permite a atacantes remotos crear archivos en directorios arbitrario a trav\u00e9s de .. (punto punto) en una ruta de acceso dentro de una petici\u00f3n HTTP." } ], "id": "CVE-2012-2968", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-12T16:55:01.263", "references": [ { "source": "cret@cert.org", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-06-30 22:41
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*", "matchCriteriaId": "79A3FAAD-1AAA-435A-815F-010D7310BAF3", "versionEndExcluding": "3.0.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB11056E-BDF0-406F-ACA6-BD143A193232", "versionEndExcluding": "3.1.4", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el comando de documentaci\u00f3n viewfile de Caucho Resin antes de 3.0.25 y 3.1.x anterior a 3.1.4, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante el par\u00e1metro file." } ], "id": "CVE-2008-2462", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-06-30T22:41:00.000", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30845" }, { "source": "cret@cert.org", "url": "http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205%2C%202007" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/305208" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29948" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1020372" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1930/references" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43367" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205%2C%202007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/305208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1020372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1930/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43367" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-12 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
Caucho Quercus, as distributed in Resin before 4.0.29, does not properly implement the == (equals sign equals sign) operator for comparisons, which has unspecified impact and context-dependent attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB62BA5C-7827-40AA-9D83-E4AEA482395B", "versionEndIncluding": "4.0.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4A9A59D-6C5A-4917-857E-D183B6982EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "457E68AD-E7F1-4845-9CBE-0FA4D8A8D946", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A334508B-849A-45D3-B83D-E0AE5AB4A601", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "60930A08-2692-4809-89B7-3B2FB5CEF7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "85003E89-F293-4846-AA6C-047FD3178333", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C34209E9-E33F-49C7-A298-61EEBAE77C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD3720FA-6136-48D0-82B8-513EFC26D4A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "08F7C559-7B3D-44E2-8A22-58FA021E3EC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B47B8CB3-C2ED-4E37-84DE-8018114CFE6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "54379312-A5E3-41DA-A50C-554C8787FDCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3AF6E9A6-5F37-4443-8D64-9C173DABDCA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F9759471-88B7-43D8-81AA-DFC74AE49563", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "70210B6F-B3E1-41F7-883C-4A449A480B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "CE141992-980B-4021-80B1-694DB3F21D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2079B923-2976-46BB-A28F-674EAFCCA426", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "21AEF4E3-E4AE-4053-A332-D8773F7BEC38", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "EACB10DA-9825-4D86-AD90-07CE961915A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9F12E529-14C8-4251-855D-88E3DC3BD71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "DD14F784-48E0-4F84-8F81-6AEC1A112249", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AEEF7D28-7E47-458D-9366-A916032F0594", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "8E0C1155-4E40-4597-96CF-F6BCDF2C979F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "E0651EE5-BFB1-41C7-B1F4-D61A19D98EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "31C49426-91D0-4505-88FD-19E216333C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.snap:*:*:*:*:*:*:*", "matchCriteriaId": "ED74BDDE-5978-4F48-A460-D0A7BD54154C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B781357-4F5F-45E9-B2AC-8C91C7BBD759", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.1:beta:*:*:*:*:*:*", "matchCriteriaId": "D18C7FAC-3AC3-461A-B94E-4C4E516F79EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.2:beta:*:*:*:*:*:*", "matchCriteriaId": "D6E82173-38B3-44F7-9B21-BD176AD401AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C709DB7B-64BC-4CAC-9900-86B4B8C65D0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "B19E7FA9-48A2-452E-9A88-6DDCFA5F04EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1C6D56BA-0115-4F94-900F-C7246CBAFB5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2A6766F1-DAEF-4B46-A437-70A0DA796CB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0C87B844-CB4F-432C-BB95-0BFFE21F70FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7AE0B374-65DC-41A1-BD26-484BEDCC208D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "318C85EA-0F00-4306-887F-9A2111C45736", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3348884-8D55-4A51-BB9B-94339A20F706", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD4A98DE-00B4-4211-A4D1-D88DA34E3832", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "04D7A448-ECCA-48D8-BBF1-ABBF2F1FD791", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "34C6864E-414B-464E-BC17-36B554A5EE92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "9CBB81A1-3CDD-4890-B19B-C4E4DFC7FC62", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "AB00A312-45F7-4C66-AAF5-C952DB8FFEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "75B7A1C6-AF66-4CF2-A2D9-3D9E0F1B78B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "1E4E9AF1-F863-4319-BB96-9E6CAA8FAB92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "976D2F97-5EA3-45EC-91C2-33B8081F7260", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "D43ABA6E-5061-498C-A68C-44C6942DD96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "6CB83B0F-A221-4CDA-83FC-CC8FE740AE7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "ED9ACA71-58A4-4506-83E6-36E8C09DF1E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "859A606A-3327-4884-B7F4-769B32400D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "93A3F13E-272A-4FDA-AA54-BD75BE78C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D4BE4593-C422-46D1-8F4E-293C508B5D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3791E1F7-8776-48DE-B918-18DB08D6F652", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F397825-AA09-4F34-821C-B567B04FCB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "4F18F7E1-DB6D-4FA8-81C2-05EC23DE46D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "88CD809F-AFC5-40CD-B709-E797174FA5CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9FF07CD8-6479-464E-A3CB-0F680C34461C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0146DE06-1B29-4344-A6A6-34D627E407F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D56CE194-BC17-40B7-8775-DD267731B9D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "B9EF1405-8B4E-4314-8A9D-19B3CAF15229", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "5FD16B09-AC60-4296-A523-94F960985A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1152C994-7446-43F8-90D7-4298F81C5454", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "32D0F9D9-84D7-4F04-8432-9560BBC8B529", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E04F2867-324D-451D-ABB9-A74678110777", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "89500B66-3459-46E9-A0EC-D32AF212EAD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "80B7FCA8-6C17-4C5B-98A0-C44B5338D84B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "801FA247-802F-4387-9A56-50ACE7440599", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E02F8DF-0680-47DD-9773-80CA8BBA9947", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "82BCE2FC-EE12-4B58-8B26-1EBAD3614A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "89008076-FA94-430E-9AD5-8F53D5114421", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BA9823D-9330-4E05-803B-C336B43FB0C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "512714F0-E392-472F-A520-D3EF690BB2CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5ACB49A3-9A0B-4C4C-949B-B569C2049B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "3EBF56AD-F93B-4370-A850-7046DE36591A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "DAFD4305-8A81-4C31-B97A-06F063A16827", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB7697BE-FF95-46DF-9DD1-5D114B0151BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "3D3ABF12-D4C0-4D0A-8FBD-13F596B5CDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "BE6BE8DB-6CCF-48CC-8992-546BBEE56050", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "7A9E8929-07DE-4525-95C3-24C63FB77AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF191346-0D21-4773-B0BF-2FBAEC78731C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "76C26F87-0FD8-4252-8EE6-2D34FC42D441", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "41325FF5-F3FC-4F2E-8EA6-41EEAA8AC724", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "70990ADF-5ABE-4C69-8ECA-F725119F0C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "6CAA2934-AA3A-4AD3-ACCD-96B66BAC1C73", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "39C70610-2570-4DE1-9FAC-971C5234208E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "6A70AAE6-EB10-4544-BFD1-6679D86D8FC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "0813C483-FDFD-4CA0-AEB5-110959D27DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "82A5CBB1-F008-473F-973D-C77FF7ACE18D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "7E1F3562-660A-46D8-AF58-F30E37C71C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "14DA8A16-B6DB-443C-8A6E-8055DA2AA38F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, does not properly implement the == (equals sign equals sign) operator for comparisons, which has unspecified impact and context-dependent attack vectors." }, { "lang": "es", "value": "Caucho Quercus, tal y como se distribuye en Resib antes de v4.0.29, no implementa correctamente el operador == (signo igual, signo igual) para las comparaciones, lo cual tiene un impacto no especificado y vectores de ataque dependientes del contexto." } ], "id": "CVE-2012-2967", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-12T16:55:01.217", "references": [ { "source": "cret@cert.org", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-12 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
Caucho Quercus, as distributed in Resin before 4.0.29, does not properly handle unspecified characters in the names of variables, which has unknown impact and remote attack vectors, related to an "HTTP Parameter Contamination" issue.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB62BA5C-7827-40AA-9D83-E4AEA482395B", "versionEndIncluding": "4.0.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4A9A59D-6C5A-4917-857E-D183B6982EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "457E68AD-E7F1-4845-9CBE-0FA4D8A8D946", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A334508B-849A-45D3-B83D-E0AE5AB4A601", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "60930A08-2692-4809-89B7-3B2FB5CEF7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "85003E89-F293-4846-AA6C-047FD3178333", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C34209E9-E33F-49C7-A298-61EEBAE77C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD3720FA-6136-48D0-82B8-513EFC26D4A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "08F7C559-7B3D-44E2-8A22-58FA021E3EC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B47B8CB3-C2ED-4E37-84DE-8018114CFE6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "54379312-A5E3-41DA-A50C-554C8787FDCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3AF6E9A6-5F37-4443-8D64-9C173DABDCA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F9759471-88B7-43D8-81AA-DFC74AE49563", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "70210B6F-B3E1-41F7-883C-4A449A480B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "CE141992-980B-4021-80B1-694DB3F21D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2079B923-2976-46BB-A28F-674EAFCCA426", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "21AEF4E3-E4AE-4053-A332-D8773F7BEC38", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "EACB10DA-9825-4D86-AD90-07CE961915A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9F12E529-14C8-4251-855D-88E3DC3BD71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "DD14F784-48E0-4F84-8F81-6AEC1A112249", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AEEF7D28-7E47-458D-9366-A916032F0594", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "8E0C1155-4E40-4597-96CF-F6BCDF2C979F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "E0651EE5-BFB1-41C7-B1F4-D61A19D98EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "31C49426-91D0-4505-88FD-19E216333C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.snap:*:*:*:*:*:*:*", "matchCriteriaId": "ED74BDDE-5978-4F48-A460-D0A7BD54154C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B781357-4F5F-45E9-B2AC-8C91C7BBD759", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.1:beta:*:*:*:*:*:*", "matchCriteriaId": "D18C7FAC-3AC3-461A-B94E-4C4E516F79EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.2:beta:*:*:*:*:*:*", "matchCriteriaId": "D6E82173-38B3-44F7-9B21-BD176AD401AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C709DB7B-64BC-4CAC-9900-86B4B8C65D0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "B19E7FA9-48A2-452E-9A88-6DDCFA5F04EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1C6D56BA-0115-4F94-900F-C7246CBAFB5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2A6766F1-DAEF-4B46-A437-70A0DA796CB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0C87B844-CB4F-432C-BB95-0BFFE21F70FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7AE0B374-65DC-41A1-BD26-484BEDCC208D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "318C85EA-0F00-4306-887F-9A2111C45736", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3348884-8D55-4A51-BB9B-94339A20F706", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD4A98DE-00B4-4211-A4D1-D88DA34E3832", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "04D7A448-ECCA-48D8-BBF1-ABBF2F1FD791", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "34C6864E-414B-464E-BC17-36B554A5EE92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "9CBB81A1-3CDD-4890-B19B-C4E4DFC7FC62", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "AB00A312-45F7-4C66-AAF5-C952DB8FFEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "75B7A1C6-AF66-4CF2-A2D9-3D9E0F1B78B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "1E4E9AF1-F863-4319-BB96-9E6CAA8FAB92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "976D2F97-5EA3-45EC-91C2-33B8081F7260", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "D43ABA6E-5061-498C-A68C-44C6942DD96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "6CB83B0F-A221-4CDA-83FC-CC8FE740AE7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "ED9ACA71-58A4-4506-83E6-36E8C09DF1E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "859A606A-3327-4884-B7F4-769B32400D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "93A3F13E-272A-4FDA-AA54-BD75BE78C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D4BE4593-C422-46D1-8F4E-293C508B5D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3791E1F7-8776-48DE-B918-18DB08D6F652", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F397825-AA09-4F34-821C-B567B04FCB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "4F18F7E1-DB6D-4FA8-81C2-05EC23DE46D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "88CD809F-AFC5-40CD-B709-E797174FA5CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9FF07CD8-6479-464E-A3CB-0F680C34461C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0146DE06-1B29-4344-A6A6-34D627E407F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D56CE194-BC17-40B7-8775-DD267731B9D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "B9EF1405-8B4E-4314-8A9D-19B3CAF15229", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "5FD16B09-AC60-4296-A523-94F960985A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1152C994-7446-43F8-90D7-4298F81C5454", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "32D0F9D9-84D7-4F04-8432-9560BBC8B529", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E04F2867-324D-451D-ABB9-A74678110777", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "89500B66-3459-46E9-A0EC-D32AF212EAD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "80B7FCA8-6C17-4C5B-98A0-C44B5338D84B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "801FA247-802F-4387-9A56-50ACE7440599", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E02F8DF-0680-47DD-9773-80CA8BBA9947", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "82BCE2FC-EE12-4B58-8B26-1EBAD3614A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "89008076-FA94-430E-9AD5-8F53D5114421", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BA9823D-9330-4E05-803B-C336B43FB0C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "512714F0-E392-472F-A520-D3EF690BB2CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5ACB49A3-9A0B-4C4C-949B-B569C2049B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "3EBF56AD-F93B-4370-A850-7046DE36591A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "DAFD4305-8A81-4C31-B97A-06F063A16827", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB7697BE-FF95-46DF-9DD1-5D114B0151BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "3D3ABF12-D4C0-4D0A-8FBD-13F596B5CDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "BE6BE8DB-6CCF-48CC-8992-546BBEE56050", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "7A9E8929-07DE-4525-95C3-24C63FB77AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF191346-0D21-4773-B0BF-2FBAEC78731C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "76C26F87-0FD8-4252-8EE6-2D34FC42D441", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "41325FF5-F3FC-4F2E-8EA6-41EEAA8AC724", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "70990ADF-5ABE-4C69-8ECA-F725119F0C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "6CAA2934-AA3A-4AD3-ACCD-96B66BAC1C73", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "39C70610-2570-4DE1-9FAC-971C5234208E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "6A70AAE6-EB10-4544-BFD1-6679D86D8FC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "0813C483-FDFD-4CA0-AEB5-110959D27DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "82A5CBB1-F008-473F-973D-C77FF7ACE18D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "7E1F3562-660A-46D8-AF58-F30E37C71C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "14DA8A16-B6DB-443C-8A6E-8055DA2AA38F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, does not properly handle unspecified characters in the names of variables, which has unknown impact and remote attack vectors, related to an \"HTTP Parameter Contamination\" issue." }, { "lang": "es", "value": "Caucho Quercus, tal y como se distribuye en Resin antes de v4.0.29, no trata correctamente los caracteres no especificados en los nombres de variables, lo cual tiene un impacto y vectores de ataque a distancia desconocidos. Se trata de un problema relacionado con una \"contaminaci\u00f3n de par\u00e1metro HTTP\" .\r\n" } ], "id": "CVE-2012-2965", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-12T16:55:01.090", "references": [ { "source": "cret@cert.org", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-24 19:30
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in resin-admin/digest.php in Caucho Technology Resin Professional 3.1.5, 3.1.10, 4.0.6, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via the (1) digest_realm or (2) digest_username parameters. NOTE: some of these details are obtained from third party information.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:3.1.5:-:pro:*:*:*:*:*", "matchCriteriaId": "657A4469-C632-4BC7-9B32-4F28E1472965", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.10:-:pro:*:*:*:*:*", "matchCriteriaId": "0AC51B4A-232B-4EB4-860C-820CE98EAC4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.6:-:pro:*:*:*:*:*", "matchCriteriaId": "2527B859-6C4D-434D-8053-D1271E5F8E80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in resin-admin/digest.php in Caucho Technology Resin Professional 3.1.5, 3.1.10, 4.0.6, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via the (1) digest_realm or (2) digest_username parameters. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en resin-admin/digest.php de Caucho Technology Resin Professional v3.1.5, v3.1.10, v4.0.6, y posiblemente otras versiones. Permiten a atacantes remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1) digest_realm o (2) digest_username. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n procedente de terceras partes." } ], "id": "CVE-2010-2032", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-24T19:30:01.553", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/1005-exploits/cauchoresin312-xss.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39839" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/511341/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/40251" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1201" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/1005-exploits/cauchoresin312-xss.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/511341/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/40251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58733" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Per Caucho Technology, this product has been updated in version 4.0.7.", "lastModified": "2013-01-18T00:00:00", "organization": "Caucho Technology" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-11-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Caucho Technology Resin 2.1.12 allows remote attackers to gain sensitive information and view the contents of the /WEB-INF/ directory via an HTTP request for "WEB-INF..", which is equivalent to "WEB-INF" in Windows.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=107635084830547&w=2 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/9617 | Exploit, Third Party Advisory, VDB Entry, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/15087 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=107635084830547&w=2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/9617 | Exploit, Third Party Advisory, VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/15087 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "DD14F784-48E0-4F84-8F81-6AEC1A112249", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Caucho Technology Resin 2.1.12 allows remote attackers to gain sensitive information and view the contents of the /WEB-INF/ directory via an HTTP request for \"WEB-INF..\", which is equivalent to \"WEB-INF\" in Windows." }, { "lang": "es", "value": "Caucho Technology Resin 2.1.12 permite a atacantes remotos obtener informaci\u00f3n sensible y ver los contenidos del directorio /WEB-INF/ mediante una petici\u00f3n HTTP de \"WEB-INF..\", que es equivalente a \"WEB-INF\" en Windows." } ], "id": "CVE-2004-0281", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-11-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=107635084830547\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9617" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=107635084830547\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15087" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-27 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
Oracle Mojarra 1.2_14 and 2.0.2, as used in IBM WebSphere Application Server, Caucho Resin, and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ACDA2C2-4331-4687-80EF-E1F59EDAFA49", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F30E314-888C-42AE-A173-7C002500B4D4", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mojarra:1.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "B0EE32A1-5581-4609-8ED0-541C64E4F4AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mojarra:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B61EBC64-67E8-48FB-85B6-FBDDC4792152", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle Mojarra 1.2_14 and 2.0.2, as used in IBM WebSphere Application Server, Caucho Resin, and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object." }, { "lang": "es", "value": "Oracle Mojarra v1.2_14 y v2.0.2, utilizado en IBM WebSphere Application Server, Caucho Resin, y otras aplicaciones, no maneja adecuadamente un estado de vista sin cifrar, lo que permite a atacantes remotos dirigir ataques de secuencias de comandos en sitios cruzados (XSS) o ejecutar sentencias del lenguaje de expresi\u00f3n (EL) a trav\u00e9s de vectores que pretenden modificar las vistas de objetos serializados." } ], "id": "CVE-2010-2087", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-27T19:00:01.093", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2010-001.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-26 15:55
Modified
2025-04-12 10:46
Severity ?
Summary
The ISO-8859-1 encoder in Resin Pro before 4.0.40 does not properly perform Unicode transformations, which allows remote attackers to bypass intended text restrictions via crafted characters, as demonstrated by bypassing an XSS protection mechanism.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://caucho.com/products/resin/download#download | Patch | |
cret@cert.org | http://www.kb.cert.org/vuls/id/162308 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://caucho.com/products/resin/download#download | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/162308 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:professional:*:*:*", "matchCriteriaId": "CF911461-9047-43E3-88FA-FDBD80EDBBAF", "versionEndIncluding": "4.0.39", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.36:*:*:*:professional:*:*:*", "matchCriteriaId": "5ADC8207-50CE-4787-B858-CDC8942059A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.37:*:*:*:professional:*:*:*", "matchCriteriaId": "7883A7C0-4477-4344-882C-0861A25AB384", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.38:*:*:*:professional:*:*:*", "matchCriteriaId": "4DD1E629-560A-44A9-B246-FAC290B57650", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ISO-8859-1 encoder in Resin Pro before 4.0.40 does not properly perform Unicode transformations, which allows remote attackers to bypass intended text restrictions via crafted characters, as demonstrated by bypassing an XSS protection mechanism." }, { "lang": "es", "value": "El codificador ISO-8859-1 en Resin Pro anterior a 4.0.40 no realiza debidamente las transformaciones Unicode, lo que permite a atacantes remotos evadir las restricciones de texto a trav\u00e9s de caracteres manipulados, tal y como fue demostrado mediante la evasi\u00f3n de un mecanismo de protecci\u00f3n contra XSS." } ], "id": "CVE-2014-2966", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-26T15:55:03.527", "references": [ { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://caucho.com/products/resin/download#download" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/162308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://caucho.com/products/resin/download#download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/162308" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-12 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
Caucho Quercus, as distributed in Resin before 4.0.29, overwrites entries in the SERVER superglobal array on the basis of POST parameters, which has unspecified impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB62BA5C-7827-40AA-9D83-E4AEA482395B", "versionEndIncluding": "4.0.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4A9A59D-6C5A-4917-857E-D183B6982EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "457E68AD-E7F1-4845-9CBE-0FA4D8A8D946", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A334508B-849A-45D3-B83D-E0AE5AB4A601", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "60930A08-2692-4809-89B7-3B2FB5CEF7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "85003E89-F293-4846-AA6C-047FD3178333", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C34209E9-E33F-49C7-A298-61EEBAE77C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD3720FA-6136-48D0-82B8-513EFC26D4A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "08F7C559-7B3D-44E2-8A22-58FA021E3EC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B47B8CB3-C2ED-4E37-84DE-8018114CFE6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "54379312-A5E3-41DA-A50C-554C8787FDCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3AF6E9A6-5F37-4443-8D64-9C173DABDCA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F9759471-88B7-43D8-81AA-DFC74AE49563", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "70210B6F-B3E1-41F7-883C-4A449A480B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "CE141992-980B-4021-80B1-694DB3F21D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2079B923-2976-46BB-A28F-674EAFCCA426", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "21AEF4E3-E4AE-4053-A332-D8773F7BEC38", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "EACB10DA-9825-4D86-AD90-07CE961915A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9F12E529-14C8-4251-855D-88E3DC3BD71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "DD14F784-48E0-4F84-8F81-6AEC1A112249", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AEEF7D28-7E47-458D-9366-A916032F0594", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "8E0C1155-4E40-4597-96CF-F6BCDF2C979F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "E0651EE5-BFB1-41C7-B1F4-D61A19D98EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "31C49426-91D0-4505-88FD-19E216333C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:2.1.snap:*:*:*:*:*:*:*", "matchCriteriaId": "ED74BDDE-5978-4F48-A460-D0A7BD54154C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B781357-4F5F-45E9-B2AC-8C91C7BBD759", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.1:beta:*:*:*:*:*:*", "matchCriteriaId": "D18C7FAC-3AC3-461A-B94E-4C4E516F79EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.2:beta:*:*:*:*:*:*", "matchCriteriaId": "D6E82173-38B3-44F7-9B21-BD176AD401AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C709DB7B-64BC-4CAC-9900-86B4B8C65D0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "B19E7FA9-48A2-452E-9A88-6DDCFA5F04EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1C6D56BA-0115-4F94-900F-C7246CBAFB5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2A6766F1-DAEF-4B46-A437-70A0DA796CB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0C87B844-CB4F-432C-BB95-0BFFE21F70FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7AE0B374-65DC-41A1-BD26-484BEDCC208D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "318C85EA-0F00-4306-887F-9A2111C45736", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3348884-8D55-4A51-BB9B-94339A20F706", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD4A98DE-00B4-4211-A4D1-D88DA34E3832", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "04D7A448-ECCA-48D8-BBF1-ABBF2F1FD791", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "34C6864E-414B-464E-BC17-36B554A5EE92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "9CBB81A1-3CDD-4890-B19B-C4E4DFC7FC62", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "AB00A312-45F7-4C66-AAF5-C952DB8FFEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "75B7A1C6-AF66-4CF2-A2D9-3D9E0F1B78B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "1E4E9AF1-F863-4319-BB96-9E6CAA8FAB92", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "976D2F97-5EA3-45EC-91C2-33B8081F7260", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "D43ABA6E-5061-498C-A68C-44C6942DD96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "6CB83B0F-A221-4CDA-83FC-CC8FE740AE7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "ED9ACA71-58A4-4506-83E6-36E8C09DF1E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "859A606A-3327-4884-B7F4-769B32400D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "93A3F13E-272A-4FDA-AA54-BD75BE78C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D4BE4593-C422-46D1-8F4E-293C508B5D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3791E1F7-8776-48DE-B918-18DB08D6F652", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F397825-AA09-4F34-821C-B567B04FCB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "4F18F7E1-DB6D-4FA8-81C2-05EC23DE46D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "88CD809F-AFC5-40CD-B709-E797174FA5CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9FF07CD8-6479-464E-A3CB-0F680C34461C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0146DE06-1B29-4344-A6A6-34D627E407F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D56CE194-BC17-40B7-8775-DD267731B9D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "B9EF1405-8B4E-4314-8A9D-19B3CAF15229", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "5FD16B09-AC60-4296-A523-94F960985A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "1152C994-7446-43F8-90D7-4298F81C5454", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "32D0F9D9-84D7-4F04-8432-9560BBC8B529", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E04F2867-324D-451D-ABB9-A74678110777", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "89500B66-3459-46E9-A0EC-D32AF212EAD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "80B7FCA8-6C17-4C5B-98A0-C44B5338D84B", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "801FA247-802F-4387-9A56-50ACE7440599", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E02F8DF-0680-47DD-9773-80CA8BBA9947", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "82BCE2FC-EE12-4B58-8B26-1EBAD3614A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "89008076-FA94-430E-9AD5-8F53D5114421", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BA9823D-9330-4E05-803B-C336B43FB0C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "512714F0-E392-472F-A520-D3EF690BB2CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5ACB49A3-9A0B-4C4C-949B-B569C2049B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "3EBF56AD-F93B-4370-A850-7046DE36591A", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "DAFD4305-8A81-4C31-B97A-06F063A16827", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB7697BE-FF95-46DF-9DD1-5D114B0151BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "3D3ABF12-D4C0-4D0A-8FBD-13F596B5CDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "BE6BE8DB-6CCF-48CC-8992-546BBEE56050", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "7A9E8929-07DE-4525-95C3-24C63FB77AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF191346-0D21-4773-B0BF-2FBAEC78731C", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "76C26F87-0FD8-4252-8EE6-2D34FC42D441", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "41325FF5-F3FC-4F2E-8EA6-41EEAA8AC724", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "70990ADF-5ABE-4C69-8ECA-F725119F0C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "6CAA2934-AA3A-4AD3-ACCD-96B66BAC1C73", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "39C70610-2570-4DE1-9FAC-971C5234208E", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "6A70AAE6-EB10-4544-BFD1-6679D86D8FC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "0813C483-FDFD-4CA0-AEB5-110959D27DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "82A5CBB1-F008-473F-973D-C77FF7ACE18D", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "7E1F3562-660A-46D8-AF58-F30E37C71C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:caucho:resin:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "14DA8A16-B6DB-443C-8A6E-8055DA2AA38F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Caucho Quercus, as distributed in Resin before 4.0.29, overwrites entries in the SERVER superglobal array on the basis of POST parameters, which has unspecified impact and remote attack vectors." }, { "lang": "es", "value": "Caucho Quercus, distribuido como (Resin) anterior a v4.0.29, sobre escribe entradas en el (array superglobal SERVER) a trav\u00e9s de par\u00e1metros b\u00e1sicos de POST, lo cual tiene un impacto no especificado y podr\u00eda suponer vectores remotos de ataque.\r\n" } ], "id": "CVE-2012-2966", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-12T16:55:01.137", "references": [ { "source": "cret@cert.org", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/" }, { "source": "cret@cert.org", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://caucho.com/resin-4.0/changes/changes.xtp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/309979" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }