Show plain JSON{"id": "CVE-2007-0187", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2007-01-12T05:04:00.000", "references": [{"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0141.html", "source": "cve@mitre.org"}, {"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051651.html", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/39167", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/23626", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/23640", "source": "cve@mitre.org"}, {"url": "http://www.mnin.org/advisories/2007_firepass.pdf", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/21957", "source": "cve@mitre.org"}, {"url": "https://tech.f5.com/home/solutions/sol6916.html", "source": "cve@mitre.org"}, {"url": "https://tech.f5.com/home/solutions/sol6924.html", "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0141.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051651.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/39167", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/23626", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/23640", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mnin.org/advisories/2007_firepass.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/21957", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://tech.f5.com/home/solutions/sol6916.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://tech.f5.com/home/solutions/sol6924.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "F5 FirePass 5.4 through 5.5.2 and 6.0 allows remote attackers to access restricted URLs via (1) a trailing null byte, (2) multiple leading slashes, (3) Unicode encoding, (4) URL-encoded directory traversal or same-directory characters, or (5) upper case letters in the domain name."}, {"lang": "es", "value": "F5 FirePass 5.4 hasta 5.5.2 y 6.0 permite a atacantes remotos acceder a URL's restringidas mediante (1) en un byte nulo al final, (2) m\u00faltiples barras iniciales, (3) codificaci\u00f3n Unicode , (4) curte de directorios URL-encoded \u00f3 caracteres de mismo directorio, \u00f3 (5) letras may\u00fasculas en el nombre de dominio."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:f5:firepass:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D1F4903-B7FB-4F0E-A4F0-5BC813F5BA22"}, {"criteria": "cpe:2.3:h:f5:firepass:5.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD7A44F4-212D-445E-A283-8CC68C7415DE"}, {"criteria": "cpe:2.3:h:f5:firepass:5.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BEFC14C-CD35-43BD-BCC9-CD437DAC688D"}, {"criteria": "cpe:2.3:h:f5:firepass:5.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAE893BF-A7DA-4FEC-9290-0FD202EC0D8F"}, {"criteria": "cpe:2.3:h:f5:firepass:5.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3347FD7A-49F6-464B-A3DA-4D9DD8B0955C"}, {"criteria": "cpe:2.3:h:f5:firepass:5.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34DE479A-5D1B-4A21-94AE-D613BA9E6120"}, {"criteria": "cpe:2.3:h:f5:firepass:5.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9767F21-1539-4313-B2DA-2D368CADDA66"}, {"criteria": "cpe:2.3:h:f5:firepass:5.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0286D438-6F1B-4D91-9A5B-CF12FEDDF427"}, {"criteria": "cpe:2.3:h:f5:firepass:5.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0ADF9E53-79F7-4678-A599-20385EEF993C"}, {"criteria": "cpe:2.3:h:f5:firepass:5.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E646309D-AAF0-48D7-B8FF-A57DFAADCF05"}, {"criteria": "cpe:2.3:h:f5:firepass:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "186F19A2-C1F4-4D87-828B-6825B89F9C9D"}, {"criteria": "cpe:2.3:h:f5:firepass:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48D051A9-891E-4C1F-904C-058B37F95441"}, {"criteria": "cpe:2.3:h:f5:firepass:5.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4982DC66-27A6-4A23-A8C7-CF3CC4A5F2BF"}, {"criteria": "cpe:2.3:h:f5:firepass:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BDC49A3-D95D-4DDA-AAFD-4C58C7BA5042"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}