fkie_cve-2004-0204
Vulnerability from fkie_nvd
Published
2004-08-06 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bea | weblogic_server | 8.1 | |
bea | weblogic_server | 8.1 | |
bea | weblogic_server | 8.1 | |
bea | weblogic_server | 8.1 | |
bea | weblogic_server | 8.1 | |
bea | weblogic_server | 8.1 | |
bea | weblogic_server | 8.1 | |
bea | weblogic_server | 8.1 | |
bea | weblogic_server | 8.1 | |
borland_software | j_builder | * | |
businessobjects | crystal_enterprise | 9 | |
businessobjects | crystal_enterprise | 10 | |
businessobjects | crystal_enterprise_java_sdk | 8.5 | |
businessobjects | crystal_enterprise_ras | 8.5 | |
businessobjects | crystal_reports | 9 | |
businessobjects | crystal_reports | 10 | |
microsoft | business_solutions_crm | 1.2 | |
microsoft | outlook | 2003 | |
microsoft | visual_studio_.net | 2003 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "E08D4CEA-9ACC-4869-BC87-3524A059914F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*", "matchCriteriaId": "ADED8968-EA9C-4F0E-AD2F-BC834F4D8A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*", "matchCriteriaId": "A3DFE048-905E-4890-809D-F6BCEF7F83C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "6F5B2A06-CE19-4A57-9566-09FC1E259CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*", "matchCriteriaId": "F7560131-A6AC-4BBB-AA2D-C7C63AB51226", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*", "matchCriteriaId": "349036A0-B5E2-4656-8D2D-26BEE9EF9DFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "D18E22CC-A0FC-4BC7-AD39-2645F57486C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*", "matchCriteriaId": "893C2387-03E3-4F8E-9029-BC64C64239EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*", "matchCriteriaId": "D00633D1-4B38-48D9-B5CD-E8D66EA90599", "vulnerable": true }, { "criteria": "cpe:2.3:a:borland_software:j_builder:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A50A593-04D3-4FDA-8015-901750AEE4C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:9:*:*:*:*:*:*:*", "matchCriteriaId": "53235D62-18AA-4482-B9AE-9E1AE87BDB3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise:10:*:*:*:*:*:*:*", "matchCriteriaId": "38F02473-3701-413D-B2F2-B400958F22F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise_java_sdk:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F1A5E6C-F762-4FD1-A105-EFC4E3746B6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:businessobjects:crystal_enterprise_ras:8.5:*:unix:*:*:*:*:*", "matchCriteriaId": "CD34959D-8A0C-48B4-8132-865406EABB4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:businessobjects:crystal_reports:9:*:*:*:*:*:*:*", "matchCriteriaId": "716121F8-EE8D-4A4C-BAB6-943BE3ADDC1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:businessobjects:crystal_reports:10:*:*:*:*:*:*:*", "matchCriteriaId": "F4D5162B-391B-4B36-A688-8D903218B3B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:business_solutions_crm:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "5FFC5454-8557-4886-AEB4-3E04EC6FC477", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2003:*:business_contact_manager:*:*:*:*:*", "matchCriteriaId": "F148421C-7BF5-4A58-83DF-4879B27C912A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_.net:2003:gold:*:*:*:*:*:*", "matchCriteriaId": "B9E6C132-4F4B-4FB0-9DDC-DD9750D8552D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via \"..\" sequences in the dynamicimag argument to crystalimagehandler.aspx." }, { "lang": "es", "value": "Vulnerabilidad de atravesamiento de directorios en los visores web de Business Objects Crystal Reports 9 and 10, y Crystal Enterprise 9 o 10, usados en Visual Studio .NET 2003 y Outlook 2003 con Business Contact Manager, Microsoft Business Solutions CRM 1.2, y otros productos, permiten a atacantes remotos leer y borrar ficheros de su elecci\u00f3n mediante secuencias \"..\" en el argumento dynamicimag de crystalimagehandler.aspx." } ], "id": "CVE-2004-0204", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-08-06T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108360413811017\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108671836127360\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/11800" }, { "source": "cve@mitre.org", "url": "http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/6748" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10260" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16044" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108360413811017\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108671836127360\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/11800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/6748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…