ID CVE-2007-2232
Type cve
Reporter cve@mitre.org
Modified 2018-10-16T16:42:00
Description
The CHECK command in Cosign 2.0.1 and earlier allows remote attackers to bypass authentication requirements via CR (\r) sequences in the cosign cookie parameter.
{"id": "CVE-2007-2232", "bulletinFamily": "NVD", "title": "CVE-2007-2232", "description": "The CHECK command in Cosign 2.0.1 and earlier allows remote attackers to bypass authentication requirements via CR (\\r) sequences in the cosign cookie parameter.", "published": "2007-04-25T15:19:00", "modified": "2018-10-16T16:42:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-2232", "reporter": "cve@mitre.org", "references": ["http://www.umich.edu/~umweb/software/cosign/cosign-vuln-2007-001.txt", "http://secunia.com/advisories/24845", "http://www.securityfocus.com/archive/1/465386/100/100/threaded", "http://www.vupen.com/english/advisories/2007/1359"], "cvelist": ["CVE-2007-2232"], "type": "cve", "lastseen": "2019-05-29T18:08:59", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "4dd608acc5ea46f01a6a14b3cc29ea18"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "8fcfa3b4ea6225855ed14eab6eab213a"}, {"key": "cpe23", "hash": "dae2b039d79c08608c06008d79b992ac"}, {"key": "cvelist", "hash": "51327702168a4d7221a0c23cf439003b"}, {"key": "cvss", "hash": "0b053db5674b87efff89989a8a720df3"}, {"key": "cvss2", "hash": "a11071654cde664199dac48330e1f990"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "78a7a5cbaf09985c14389298e454e7db"}, {"key": "description", "hash": "51fa9286406d5d8bcc92aac95a2bc3a0"}, {"key": "href", "hash": "7f1bb3a77a8176130a3cf1196be22292"}, {"key": "modified", "hash": "a3534ee7dfd4095d0c50879507cd6247"}, {"key": "published", "hash": "da0433224dd9391da7f8d362d663bee3"}, {"key": "references", "hash": "a4bdb2494b4ed9ac650d73799034ceb6"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "1272dafe5b53c520b4bc6ad624542577"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "2e8b2462cd741d905b50e3dab71522c8eb07cc2909ac0791eb1c12dcbd6728ec", "viewCount": 0, "enchantments": {"score": {"value": 6.7, "vector": "NONE", "modified": "2019-05-29T18:08:59"}, "dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:29842"]}, {"type": "osvdb", "idList": ["OSVDB:34833"]}], "modified": "2019-05-29T18:08:59"}, "vulnersScore": 6.7}, "objectVersion": "1.3", "cpe": ["cpe:/a:cosign:cosign:2.0.1", "cpe:/a:cosign:cosign:1.5", "cpe:/a:cosign:cosign:1.0", "cpe:/a:cosign:cosign:0.8.0", "cpe:/a:cosign:cosign:1.8.5", "cpe:/a:cosign:cosign:1.9", "cpe:/a:cosign:cosign:0.9.0", "cpe:/a:cosign:cosign:1.8", "cpe:/a:cosign:cosign:1.6", "cpe:/a:cosign:cosign:0.7.0", "cpe:/a:cosign:cosign:1.7", "cpe:/a:cosign:cosign:1.1"], "affectedSoftware": [{"name": "cosign cosign", "operator": "eq", "version": "0.8.0"}, {"name": "cosign cosign", "operator": "eq", "version": "1.9"}, {"name": "cosign cosign", "operator": "eq", "version": "1.1"}, {"name": "cosign cosign", "operator": "eq", "version": "1.8"}, {"name": "cosign cosign", "operator": "eq", "version": "2.0.1"}, {"name": "cosign cosign", "operator": "eq", "version": "1.5"}, {"name": "cosign cosign", "operator": "eq", "version": "1.6"}, {"name": "cosign cosign", "operator": "eq", "version": "0.7.0"}, {"name": "cosign cosign", "operator": "eq", "version": "1.0"}, {"name": "cosign cosign", "operator": "eq", "version": "1.7"}, {"name": "cosign cosign", "operator": "eq", "version": "0.9.0"}, {"name": "cosign cosign", "operator": "eq", "version": "1.8.5"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:cosign:cosign:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cosign:cosign:2.0.1:*:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"]}
{"exploitdb": [{"lastseen": "2016-02-03T11:14:35", "bulletinFamily": "exploit", "description": "Cosign 2.0.1/2.9.4a CGI Check Cookie Command Remote Authentication Bypass Vulnerability. CVE-2007-2232. Webapps exploit for cgi platform", "modified": "2007-04-11T00:00:00", "published": "2007-04-11T00:00:00", "id": "EDB-ID:29842", "href": "https://www.exploit-db.com/exploits/29842/", "type": "exploitdb", "title": "Cosign 2.0.1/2.9.4a CGI Check Cookie Command Remote Authentication Bypass Vulnerability", "sourceData": "source: http://www.securityfocus.com/bid/23422/info\r\n\r\nThe 'cosign' application is prone to an authentication-bypass vulnerability because it fails to adequately sanitize user-supplied input.\r\n\r\nAn attacker can exploit this issue to gain unauthorized access to services hosted on an affected computer.\r\n\r\nVersions prior to 1.9.4b and 2.0.2a are vulnerable. \r\n\r\ncosign=X\\rLOGIN cosign=X 1.2.3.4 username\\rREGISTER cosign=X 1.2.3.4 cosign-servicename=Y ", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/29842/"}], "osvdb": [{"lastseen": "2017-04-28T13:20:31", "bulletinFamily": "software", "description": "## Solution Description\nUpgrade to version 2.0.2a, 1.9.4b or higher, as it has been reported to fix this vulnerability. In addition, Cosign has released a patch for some older versions.\n## References:\nVendor URL: http://weblogin.org/\nVendor Specific News/Changelog Entry: http://www.umich.edu/~umweb/software/cosign/cosign-vuln-2007-001.txt\n[Secunia Advisory ID:24845](https://secuniaresearch.flexerasoftware.com/advisories/24845/)\n[Related OSVDB ID: 34834](https://vulners.com/osvdb/OSVDB:34834)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-04/0170.html\nFrSIRT Advisory: ADV-2007-1359\n[CVE-2007-2232](https://vulners.com/cve/CVE-2007-2232)\n", "modified": "2007-03-28T05:03:58", "published": "2007-03-28T05:03:58", "href": "https://vulners.com/osvdb/OSVDB:34833", "id": "OSVDB:34833", "title": "CoSign CHECK Command cosign Cookie Variable CRLF Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}