Executive Summary

Informations
Name CVE-2002-0934 First vendor Publication 2002-10-04
Vendor Cve Last vendor Modification 2008-09-05

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Cvss Base Score 6.4 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Directory traversal vulnerability in Jon Hedley AlienForm2 (typically installed as af.cgi or alienform.cgi) allows remote attackers to read or modify arbitrary files via an illegal character in the middle of a .. (dot dot) sequence in the parameters (1) _browser_out or (2) _out_file.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0934

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-78 Using Escaped Slashes in Alternate Encoding
CAPEC-79 Using Slashes in Alternate Encoding
CAPEC-80 Using UTF-8 Encoding to Bypass Validation Logic

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2005-11-03 Name : AlienForm CGI script
File : nvt/alienform.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
836 AlienForm2 alienform.cgi (af.cgi) Traversal Arbitrary File Manipulation

Snort® IPS/IDS

Date Description
2014-01-10 AlienForm af.cgi access
RuleID : 1825-community - Revision : 15 - Type : SERVER-WEBAPP
2014-01-10 AlienForm af.cgi access
RuleID : 1825 - Revision : 15 - Type : SERVER-WEBAPP
2014-01-10 AlienForm alienform.cgi access
RuleID : 1824-community - Revision : 15 - Type : SERVER-WEBAPP
2014-01-10 AlienForm alienform.cgi access
RuleID : 1824 - Revision : 15 - Type : SERVER-WEBAPP
2014-01-10 AlienForm af.cgi directory traversal attempt
RuleID : 1823-community - Revision : 15 - Type : SERVER-WEBAPP
2014-01-10 AlienForm af.cgi directory traversal attempt
RuleID : 1823 - Revision : 15 - Type : SERVER-WEBAPP
2014-01-10 AlienForm alienform.cgi directory traversal attempt
RuleID : 1822-community - Revision : 16 - Type : SERVER-WEBAPP
2014-01-10 AlienForm alienform.cgi directory traversal attempt
RuleID : 1822 - Revision : 16 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2002-06-11 Name : The remote host contains a Perl application that is affected by a directory t...
File : alienform.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/4983
BUGTRAQ http://archives.neohapsis.com/archives/bugtraq/2002-06/0068.html
XF http://www.iss.net/security_center/static/9325.php

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2021-05-04 12:01:44
  • Multiple Updates
2021-04-22 01:01:52
  • Multiple Updates
2020-05-23 00:15:03
  • Multiple Updates
2014-02-17 10:24:57
  • Multiple Updates
2014-01-19 21:21:46
  • Multiple Updates
2013-05-11 12:11:16
  • Multiple Updates