Sun Java System Web Server up to 6.0 Authorization Privilege Escalation
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.7 | $0-$5k | 0.00 |
A vulnerability was found in Sun Java System Web Server up to 6.0 (Web Server) and classified as critical. This issue affects some unknown processing of the component Authorization. The manipulation with an unknown input leads to a privilege escalation vulnerability. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Sun Java System Web Server 6.1 before 20070314 allows remote authenticated users with revoked client certificates to bypass the Certificate Revocation List (CRL) authorization control and access secure web server instances running under an account different from that used for the admin server via unspecified vectors.
The weakness was shared 03/14/2007 (Website). It is possible to read the advisory at sunsolve.sun.com. The identification of this vulnerability is CVE-2007-1526 since 03/20/2007. The attack may be initiated remotely. Required for exploitation is a simple authentication. The technical details are unknown and an exploit is not publicly available.
It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 22946 (Solaris 10 (sparc) : 116648-25), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Solaris Local Security Checks.
Upgrading to version 6.1 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at Tenable (22946). The entries 35650, 38175 and 42613 are related to this item.
Product
Type
Vendor
Name
Version
License
Support
- end of life
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 5.7
VulDB Base Score: 6.3
VulDB Temp Score: 5.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Privilege EscalationCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 22946
Nessus Name: Solaris 10 (sparc) : 116648-25
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Java System Web Server 6.1
Timeline
03/14/2007 🔍03/15/2007 🔍
03/15/2007 🔍
03/15/2007 🔍
03/20/2007 🔍
03/20/2007 🔍
03/13/2015 🔍
07/13/2021 🔍
Sources
Vendor: oracle.comAdvisory: sunsolve.sun.com⛔
Status: Confirmed
CVE: CVE-2007-1526 (🔍)
SecurityTracker: 1017777 - Sun Java System Web Server May Let a Remote User With a Revoked Client Certificate Access the System
Secunia: 24531 - Sun Java System Web Server Revoked Certificate Security Bypass, Less Critical
OSVDB: 34074 - Sun Java System Web Server Certificate Revocation List (CRL) Bypass
Vupen: ADV-2007-0958
See also: 🔍
Entry
Created: 03/13/2015 12:16Updated: 07/13/2021 21:03
Changes: 03/13/2015 12:16 (58), 10/10/2017 13:05 (8), 07/13/2021 21:03 (3)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.