Vulnerability Name: | CVE-2008-2405 (CCN-42829) | ||||||||
Assigned: | 2008-06-03 | ||||||||
Published: | 2008-06-03 | ||||||||
Updated: | 2017-08-08 | ||||||||
Summary: | Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in HTTP requests to unspecified ASP applications. | ||||||||
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
6.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-2405 Source: IDEFENSE Type: UNKNOWN 20080603 Sun Java System Active Server Pages Multiple Command Injection Vulnerabilities Source: CCN Type: SA30523 Sun Java System Active Server Pages Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 30523 Source: CCN Type: SECTRACK ID: 1020190 Sun Java ASP Server Administration Server Lets Remote Users Inject Arbitrary Commands Source: CCN Type: Sun Alert ID: 238184 Multiple Security Vulnerabilities in Sun Java ASP Server may lead to execution of Arbitrary Code or Unauthorized Access to Data Source: SUNALERT Type: UNKNOWN 238184 Source: CCN Type: ASA-2008-243 Multiple Security Vulnerabilities in Sun Java ASP Server may lead to execution of Arbitrary Code or Unauthorized Access to Data (Sun 238184) Source: CCN Type: OSVDB ID: 46019 Sun Java Active Server Pages (ASP) Server Unspecified Applications Arbitrary Command Execution Source: SECTRACK Type: UNKNOWN 1020190 Source: VUPEN Type: UNKNOWN ADV-2008-1742 Source: XF Type: UNKNOWN sun-jsasp-command-execution(42829) Source: XF Type: UNKNOWN sun-jsasp-command-execution(42829) Source: CCN Type: iDefense Labs PUBLIC ADVISORY: 06.03.08 Sun Java System Active Server Pages Multiple Command Injection Vulnerabilities | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |