Vulnerabilities > CVE-2002-0236 - Unspecified vulnerability in Lucent products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Lucent VitalSuite 8.0 through 8.2, including VitalNet, VitalEvent, and VitalHelp/VitalAnalysis, allows remote attackers to bypass authentication via a direct HTTP request to the VsSetCookie.exe program, which returns a valid cookie for the desired user.
Vulnerable Configurations
Exploit-Db
description | Lucent 8.x VitalNet Password Authentication Bypass Vulnerability. CVE-2002-0236. Remote exploit for windows platform |
id | EDB-ID:21203 |
last seen | 2016-02-02 |
modified | 2002-01-16 |
published | 2002-01-16 |
reporter | Mark Cooper |
source | https://www.exploit-db.com/download/21203/ |
title | Lucent 8.x VitalNet Password Authentication Bypass Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | VSSETCOOKIE.NASL |
description | The VsSetCookie.exe CGI exists on the remote web server. Some versions of this file have an unauthorized access vulnerability. Making a request similar to : http://www.example.com/cgi-bin/VsSetCookie.exe?vsuser=<user_name> will result in full access if a valid username is provided. Please note Nessus solely relied on the existence of this CGI in reporting this vulnerability. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11731 |
published | 2003-06-11 |
reporter | This script is Copyright (C) 2003-2018 John Lampe |
source | https://www.tenable.com/plugins/nessus/11731 |
title | Lucent VitalNet VsSetCookie.exe Unauthorized Access |
code |
|