ID CVE-2002-0058 Type cve Reporter cve@mitre.org Modified 2018-10-12T21:30:00
Description
Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK.
{"osvdb": [{"lastseen": "2017-04-28T13:20:10", "bulletinFamily": "software", "cvelist": ["CVE-2002-0058"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://sunsolve.sun.com/search/document.do?assetkey=1-22-00216-1)\n[Vendor Specific Advisory URL](http://www.hitachi-support.com/security_e/vuls_e/HS02-001_e/index-e.html)\nMicrosoft Security Bulletin: MS02-013\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2002-03/0025.html\nISS X-Force ID: 8351\n[CVE-2002-0058](https://vulners.com/cve/CVE-2002-0058)\nCIAC Advisory: m-052\nBugtraq ID: 4228\n", "modified": "2002-03-04T00:00:00", "published": "2002-03-04T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:14270", "id": "OSVDB:14270", "type": "osvdb", "title": "Sun Java JRE HTTP Proxy Java Applet Session Hijack", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:05", "bulletinFamily": "software", "cvelist": ["CVE-2002-0058"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n===Java HTTP proxy vulnerability===\r\n\r\n Reference wal-01\r\n Version 1.0\r\n Date March 05, 2002\r\n\r\n===Cross references\r\n\r\n Sun Security Bulletin #00216\r\n Microsoft Security Bulletin MS02-013\r\n\r\n Vulnerability identifier CAN-2002-0058 (under review)\r\n http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0058\r\n\r\n===Classifications\r\n\r\n Java, networking, HTTP\r\n Web browsers, applets \r\n Unchecked network access, HTTP proxy connection hijacking\r\n\r\n===Abstract problem description\r\n\r\n =Background\r\nThe Java security model is designed to allow code from an untrusted\r\nsource, usually web applets, to be safely executed.\r\n\r\n =Problem\r\nAn applet could do irregular, unchecked HTTP requests.\r\n\r\n =Consequence\r\nNetwork access restrictions that apply, can be bypassed.\r\nOnly systems that have a HTTP proxy configured can be vulnerable.\r\n\r\nOne particular nasty exploit is where a remote server, aided by a\r\nhostile applet, hijacks a browsers persistent HTTP connection to its\r\nconfigured HTTP proxy.\r\n\r\n===Affected software & patch availability; vendor bulletins\r\n\r\n =Sun\r\n\r\n Bulletin Number: #00216\r\n Date: March 4, 2002\r\n Title: HttpURLConnection\r\n http://sunsolve.Sun.COM/pub-cgi/secBulletin.pl\r\n (At the time of this writing bulletin 216 was not available on\r\n the website yet.)\r\n\r\n =Microsoft\r\n\r\n Microsoft Security Bulletin MS02-013\r\n Java Applet Can Redirect Browser Traffic\r\n Originally posted: March 04, 2002\r\n http://www.microsoft.com/technet/treeview/default.asp?\r\n url=/technet/security/bulletin/MS02-013.asp\r\n (URL is wrapped, please fix.)\r\n\r\n =Netscape\r\n Sun JVM (Java Virtual Machine) Issue\r\n http://home.netscape.com/security/\r\n\r\n\r\n===Vendor contact\r\nShortly after I, more or less by coincidence, discovered the issue, I\r\nreported it to Sun on April 07, 2001. They communicated it to their\r\nJava licensees, and coordinated a synchronized response.\r\n\r\n =Free Java implementations\r\nI audited both Kaffe and GNU Classpath class libraries, and to the\r\nbest of my knowledge, they are not vulnerable to this issue. Anyone\r\nout there developing a free(TM) Java, please contact me if you have\r\nquestions or concerns, and I will be happy to assist you in any way I\r\ncan.\r\n\r\n===Disclosure policy\r\nI do not plan to release details of the vulnerability, that could make\r\nit easier for crackers to get exploits, before a three month grace\r\nperiod has expired. Customers should not to assume that the lack of\r\nvulnerability details at this time will prevent the creation of\r\nexploit programs.\r\n\r\n===Detailed problem description\r\nNo details are provided at this time.\r\nSee Disclosure policy.\r\n\r\n===PoC-exploit\r\nI supplied Sun with a PoC-exploit, and they passed it on to other\r\nvendors. No further distribution is expected.\r\n\r\n===Software I tested/audited myself.\r\nSun/Blackdown 1.1.7/8, 1.2.2, 1.3.0/1 linux/win32\r\nNetscape 4.61 default Java Runtime linux\r\nMSIE 5.0 default Java Runtime win32\r\nHotJava Browser 3.0\r\nKaffe 1.06\r\nGNU Classpath 0.03\r\n\r\n===Acknowledgment\r\nThanks to the vendors for addressing the issue. Special thanks to\r\nSun, in particular Chok Poh, for coordinating.\r\n\r\n===Disclaimer & Copying\r\nThis comes with ABSOLUTELY NO WARRANTY!\r\nCopying in whole and quoting parts permitted.\r\n\r\n===History\r\nVersion 1.0 is the first release of this document.\r\nUpdates http://www.xs4all.nl/~harmwal/issue/wal-01.txt\r\n\r\n===Contact\r\nAuthor Harmen van der Wal\r\nMail harmwal@xs4all.nl\r\nPGP http://www.xs4all.nl/~harmwal/harmen.pgp.txt\r\n\r\n===End===\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.0.6 (GNU/Linux)\r\nComment: For info see http://www.gnupg.org\r\n\r\niD8DBQE8hBnWqX9LFhm8cvYRAsXwAJ4jr1pm6lTqarPmbZNhuc4gGAwNSACeMIg9\r\nnEyfEY6Us0AxLR0FoKFM/Q0=\r\n=a9rw\r\n-----END PGP SIGNATURE-----\r\n\r\n-- \r\nHarmen van der Wal - http://www.xs4all.nl/~harmwal/\r\n\r\n", "edition": 1, "modified": "2002-03-05T00:00:00", "published": "2002-03-05T00:00:00", "id": "SECURITYVULNS:DOC:2587", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:2587", "title": "Java HTTP proxy vulnerability", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "nessus": [{"lastseen": "2021-02-01T06:14:43", "description": "The Microsoft VM is a virtual machine for the Win32 operating\nenvironment.\n\nThere are numerous security flaws in the remote Microsoft VM that could\nallow an attacker to execute arbitrary code on this host.\n\nTo exploit these flaws, an attacker would need to set up a malicious web\nsite with a rogue Java applet and lure the user of this host to visit\nit. The Java applet could then execute arbitrary commands on this\nhost.", "edition": 27, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2003-03-06T00:00:00", "title": "MS02-013: Cumulative VM Update (300845)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2002-0076", "CVE-2002-0058"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS02-013.NASL", "href": "https://www.tenable.com/plugins/nessus/11326", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# Ref: https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2002/ms02-013\n#\n# Supercedes : MS99-031, MS99-045, MS00-011, MS00-059, MS00-075, MS00-081\n#\n\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(11326);\n script_version(\"1.49\");\n script_cvs_date(\"Date: 2018/11/15 20:50:29\");\n\n script_cve_id(\"CVE-2002-0058\", \"CVE-2002-0076\");\n script_bugtraq_id(4228, 4313);\n script_xref(name:\"MSFT\", value:\"MS02-013\");\n script_xref(name:\"MSKB\", value:\"300845\");\n\n script_name(english:\"MS02-013: Cumulative VM Update (300845)\");\n script_summary(english:\"Determines the version of JView.exe\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"Arbitrary code can be executed on the remote host through the VM.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft VM is a virtual machine for the Win32 operating\nenvironment.\n\nThere are numerous security flaws in the remote Microsoft VM that could\nallow an attacker to execute arbitrary code on this host.\n\nTo exploit these flaws, an attacker would need to set up a malicious web\nsite with a rogue Java applet and lure the user of this host to visit\nit. The Java applet could then execute arbitrary commands on this\nhost.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2002/ms02-013\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft VM is no longer supported, and previous updates are no no\nlonger available. Upgrade to an actively supported product.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/03/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2002/03/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2003/03/06\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_dependencies(\"smb_nt_ms03-011.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, 'Host/patch_management_checks');\n exit(0);\n}\n\n#\n\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\n\n\ninclude(\"misc_func.inc\");\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS02-013';\nkb = '300845';\n\nkbs = make_list(kb);\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nif (hotfix_check_sp(nt:7, win2k:4, xp:1) <= 0) exit(0, 'The host is not affected based on its version / service pack.');\n\nif ( get_kb_item(\"KB816093\") ) exit(0, \"KB816093 is installed.\");\nif (!is_accessible_share()) exit(1, \"is_accessible_share() failed.\");\n\n\nif (hotfix_is_vulnerable(file:\"Jview.exe\",version:\"5.0.3.3805\",dir:\"\\system32\", bulletin:bulletin, kb:kb))\n{\n set_kb_item(name:\"SMB/Missing/\"+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n exit(0, \"The host is not affected\");\n}\n\n\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}