CVE-2004-0578

Current Description

WinGate 5.2.3 build 901 and 6.0 beta 2 build 942, and other versions such as 5.0.5, allows remote attackers to read arbitrary files via leading slash (//) characters in a URL request to the wingate-internal directory.

Basic Data

PublishedDecember 06, 2004
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationQbikWingate5.0.5*******
    2.3ApplicationQbikWingate5.2.3*******
    2.3ApplicationQbikWingate6.0_beta_2*******

Vulnerable Software List

VendorProductVersions
Qbik Wingate 5.0.5, 5.2.3, 6.0_beta_2

References

NameSourceURLTags
20040701 iDEFENSE Security Advisory 07.01.04: WinGate Information Disclosurehttp://marc.info/?l=full-disclosure&m=108872788123695&w=2FULLDISC
http://www.idefense.com/application/poi/display?id=113http://www.idefense.com/application/poi/display?id=113MISC
wingate-directory-traversal(16589)https://exchange.xforce.ibmcloud.com/vulnerabilities/16589XF