Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-1611 | First vendor Publication | 2004-10-18 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
SalesLogix 6.1 does not verify if a user is authenticated before performing sensitive operations, which could allow remote attackers to (1) execute arbitrary SLX commands on the server or spoof the server via a man-in-the-middle (MITM) attack, or (2) obtain the database password via a GetConnection request to TCP port 1707. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1611 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-21 | Exploitation of Session Variables, Resource IDs and other Trusted Credentials |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-39 | Manipulating Opaque Client-based Data Tokens |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-77 | Manipulating User-Controlled Variables |
CAPEC-274 | HTTP Verb Tampering |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
10948 | SalesLogix Server Database Authentication Credential Disclosure SalesLogix contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker issues the 'GetConnection' command (with proper parameters) to the server on TCP port 1707, which will disclose database authentication credentials resulting in a loss of confidentiality. |
10947 | SalesLogix Client/Server Authentication Weakness SalesLogix contains a flaw that may allow a malicious user to perform a man-in-the-middle attack. The issue is due to the server not authenticating the client before allowing the client's commands to be executed. It is possible that the flaw may allow the attacker to render all client/server communications insecure and gain complete access to the server, resulting in a loss of confidentiality and integrity. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:55 |
|
2024-11-28 12:06:23 |
|
2021-05-04 12:02:32 |
|
2021-04-22 01:02:44 |
|
2020-05-23 00:16:02 |
|
2017-07-11 12:01:38 |
|
2016-10-18 12:01:27 |
|
2016-06-28 15:07:25 |
|
2016-04-26 13:00:52 |
|
2013-05-11 11:45:27 |
|