CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.2 | $0-$5k | 0.00 |
A vulnerability, which was classified as critical, has been found in Gossamer Threads DBMan 2.0.4. This issue affects an unknown functionality of the file db.cgi. The manipulation of the argument db
with an unknown input leads to a information disclosure vulnerability. Using CWE to declare the problem leads to CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. Impacted is confidentiality, and integrity. The summary by CVE is:
The Gossamer Threads DBMan db.cgi CGI script allows remote attackers to view environmental variables and setup information by referencing a non-existing database in the db parameter.
The weakness was disclosed 05/05/2000 as not defined advisory (Website). It is possible to read the advisory at perfectotech.com. The identification of this vulnerability is CVE-2000-0381. The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1592 according to MITRE ATT&CK.
The vulnerability scanner Nessus provides a plugin with the ID 10403 , which helps to determine the existence of the flaw in a target environment.
Upgrading eliminates this vulnerability. Attack attempts may be identified with Snort ID 1554.
The vulnerability is also documented in the databases at X-Force (4494) and Tenable (10403).
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 6.2
VulDB Base Score: 6.5
VulDB Temp Score: 6.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 10403
OpenVAS ID: 10403
OpenVAS Name: DBMan CGI server information leakage
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Snort ID: 1554
Snort Message: SERVER-WEBAPP dbman db.cgi access
Snort Class: 🔍
SourceFire IPS: 🔍
Timeline
05/05/2000 🔍05/05/2000 🔍
05/05/2000 🔍
05/05/2000 🔍
10/15/2002 🔍
06/24/2014 🔍
05/05/2019 🔍
Sources
Advisory: perfectotech.comStatus: Not defined
CVE: CVE-2000-0381 (🔍)
X-Force: 4494
Vulnerability Center: 129 - db.cgi CGI Environment Leakage, Medium
SecurityFocus: 1178 - Gossamer Threads DBMan Information Leakage Vulnerability
Entry
Created: 06/24/2014 15:48Updated: 05/05/2019 08:36
Changes: 06/24/2014 15:48 (67), 05/05/2019 08:36 (2)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.