CVE-2007-2232
Cosign 2.0.1/2.9.4a - CGI Check Cookie Command Remote Authentication Bypass
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The CHECK command in Cosign 2.0.1 and earlier allows remote attackers to bypass authentication requirements via CR (\r) sequences in the cosign cookie parameter.
El comando CHECK en Cosign 2.0.1 y anterioes permite a atacantes remotos evitar requisitos de validación a través de la secuencia CR (\r) en el parámetro de la cookie cosign.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-04-11 First Exploit
- 2007-04-25 CVE Reserved
- 2007-04-25 CVE Published
- 2024-08-07 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/archive/1/465386/100/100/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2007/1359 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/29842 | 2007-04-11 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/24845 | 2018-10-16 |
URL | Date | SRC |
---|---|---|
http://www.umich.edu/~umweb/software/cosign/cosign-vuln-2007-001.txt | 2018-10-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 0.7.0 Search vendor "Cosign" for product "Cosign" and version "0.7.0" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 0.8.0 Search vendor "Cosign" for product "Cosign" and version "0.8.0" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 0.9.0 Search vendor "Cosign" for product "Cosign" and version "0.9.0" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 1.0 Search vendor "Cosign" for product "Cosign" and version "1.0" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 1.1 Search vendor "Cosign" for product "Cosign" and version "1.1" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 1.5 Search vendor "Cosign" for product "Cosign" and version "1.5" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 1.6 Search vendor "Cosign" for product "Cosign" and version "1.6" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 1.7 Search vendor "Cosign" for product "Cosign" and version "1.7" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 1.8 Search vendor "Cosign" for product "Cosign" and version "1.8" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 1.8.5 Search vendor "Cosign" for product "Cosign" and version "1.8.5" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 1.9 Search vendor "Cosign" for product "Cosign" and version "1.9" | - |
Affected
| ||||||
Cosign Search vendor "Cosign" | Cosign Search vendor "Cosign" for product "Cosign" | 2.0.1 Search vendor "Cosign" for product "Cosign" and version "2.0.1" | - |
Affected
|