Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2000-0696

6 documents5 sources
Severity
7.5HIGH
EPSS
9.1%
top 7.36%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 20
Latest updateFeb 7

Description

The administration interface for the dwhttpd web server in Solaris AnswerBook2 does not properly authenticate requests to its supporting CGI scripts, which allows remote attackers to add user accounts to the interface by directly calling the admin CGI script.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

NVDsun/solaris_answerbook24 versions+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jw3x-m75w-3629: The administration interface for the dwhttpd web server in Solaris AnswerBook2 does not properly authenticate requests to its supporting CGI scripts,2022-04-30
CVEList
CVE-2000-0696: The administration interface for the dwhttpd web server in Solaris AnswerBook2 does not properly authenticate requests to its supporting CGI scripts,2000-09-21

💥Exploits & PoCs

2
Exploit-DB
Sun AnswerBook2 1.4.2/1.4.3/1.4.4 - Administration Interface Access2000-08-08
Exploit-DB
Caldera OpenUnix 8.0/UnixWare 7.1.1 / HP HP-UX 11.0 / Solaris 7.0 / SunOS 4.1.4 - rpc.cmsd Buffer Overflow (2)1999-07-13

📋Vendor Advisories

1
Chrome
Stable Channel Update for Desktop: CVE-2023-06962023-02-07
CVE-2000-0696 (HIGH CVSS 7.5) | The administration interface for th | cvebase.io