ID CVE-2002-2427
Type cve
Reporter cve@mitre.org
Modified 2009-07-23T04:00:00
Description
The security handler in GoAhead WebServer before 2.1.1 allows remote attackers to bypass authentication and obtain access to protected web content via "an extra slash in a URL," a different vulnerability than CVE-2002-1603.
{"id": "CVE-2002-2427", "bulletinFamily": "NVD", "title": "CVE-2002-2427", "description": "The security handler in GoAhead WebServer before 2.1.1 allows remote attackers to bypass authentication and obtain access to protected web content via \"an extra slash in a URL,\" a different vulnerability than CVE-2002-1603.", "published": "2009-02-06T19:30:00", "modified": "2009-07-23T04:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-2427", "reporter": "cve@mitre.org", "references": ["http://data.goahead.com/Software/Webserver/2.1.8/release.htm#security-features-can-be-bypassed-by-adding-an-extra-slash-in-the-url-bug01518", "http://www.kb.cert.org/vuls/id/124059"], "cvelist": ["CVE-2002-2427"], "type": "cve", "lastseen": "2021-02-02T05:19:08", "edition": 6, "viewCount": 6, "enchantments": {"dependencies": {"references": [], "modified": "2021-02-02T05:19:08", "rev": 2}, "score": {"value": 5.9, "vector": "NONE", "modified": "2021-02-02T05:19:08", "rev": 2}, "vulnersScore": 5.9}, "cpe": ["cpe:/a:goahead:goahead_webserver:2.0", "cpe:/a:goahead:goahead_webserver:2.1"], "affectedSoftware": [{"cpeName": "goahead:goahead_webserver", "name": "goahead goahead webserver", "operator": "le", "version": "2.1"}, {"cpeName": "goahead:goahead_webserver", "name": "goahead goahead webserver", "operator": "eq", "version": "2.0"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:goahead:goahead_webserver:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:goahead:goahead_webserver:2.1:*:*:*:*:*:*:*"], "cwe": ["CWE-287"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:goahead:goahead_webserver:2.0:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:goahead:goahead_webserver:2.1:*:*:*:*:*:*:*", "versionEndIncluding": "2.1", "vulnerable": true}], "operator": "OR"}]}, "extraReferences": [{"name": "VU#124059", "refsource": "CERT-VN", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/124059"}, {"name": "http://data.goahead.com/Software/Webserver/2.1.8/release.htm#security-features-can-be-bypassed-by-adding-an-extra-slash-in-the-url-bug01518", "refsource": "CONFIRM", "tags": ["Vendor Advisory"], "url": "http://data.goahead.com/Software/Webserver/2.1.8/release.htm#security-features-can-be-bypassed-by-adding-an-extra-slash-in-the-url-bug01518"}]}
{}