Netegrity SiteMinder up to 4.5.1 Login smpwservicescgi.exe target redirect

A vulnerability was found in Netegrity SiteMinder up to 4.5.1 and classified as critical. Affected by this issue is some unknown functionality of the file /siteminderagent/pwcgi/smpwservicescgi.exe of the component Login. The manipulation of the argument target leads to open redirect. Using CWE to declare the problem leads to CWE-601. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The weakness was disclosed 01/17/2005 by Marc Ruef with scip AG as VDB-1022 as Advisory (Website). The advisory is available at vuldb.com. The public availability has been coordinated in cooperation with the vendor. This vulnerability is handled as CVE-2005-10001. The attack may be launched remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1204.001 by the MITRE ATT&CK project. It is declared as proof-of-concept. As 0-day the estimated underground price was around $5k-$25k. The bugfix is ready for download at rsasecurity.com. It is recommended to apply restrictive firewalling. A possible mitigation has been published even before and not after the disclosure of the vulnerability. The vulnerability is also documented other vulnerability databases: Secunia (SA13896) and SecurityTracker (ID 1012927).

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

181

Field

exploit_price_0day3
vulnerability_cvss2_vuldb_tempscore2
vulnerability_cvss2_vuldb_basescore2
vulnerability_cvss2_vuldb_ac2
vulnerability_cwe2

Commit Conf

100%84
90%15
98%2

Approve Conf

100%84
90%15
98%2
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1223264103/03/2022VulD...price_0day$5k-$25ksee exploit price documentation03/03/2022accepted
90
1223264003/03/2022VulD...cvss2_vuldb_tempscore5.0see CVSS documentation03/03/2022accepted
90
1223263903/03/2022VulD...cvss2_vuldb_basescore5.8see CVSS documentation03/03/2022accepted
90
1223263803/03/2022VulD...cvss2_vuldb_acMsee CVSS documentation03/03/2022accepted
100
1223263703/03/2022VulD...cwe601 (redirect)03/03/2022accepted
100
1222935703/02/2022VulD...price_0day$5k-$25ksee exploit price documentation03/02/2022accepted
90
1222935603/02/2022VulD...cvss3_vuldb_tempscore5.0see CVSS documentation03/02/2022accepted
90
1222935503/02/2022VulD...cvss3_vuldb_basescore5.4see CVSS documentation03/02/2022accepted
90
1222935403/02/2022VulD...cvss3_meta_tempscore5.0see CVSS documentation03/02/2022accepted
90
1222935303/02/2022VulD...cvss3_meta_basescore5.4see CVSS documentation03/02/2022accepted
90
1222935203/02/2022VulD...url03/02/2022accepted
100
1222935103/02/2022VulD...person_nickname03/02/2022accepted
100
1222935003/02/2022VulD...identifierVDB-102203/02/2022accepted
100
1222934903/02/2022VulD...cvss3_vuldb_uiRsee CVSS documentation03/02/2022accepted
100
1212219901/28/2022VulD...eol101/28/2022accepted
100
1212219801/28/2022VulD...responsibleVulDB01/28/2022accepted
100
1212219701/28/2022VulD...cve_cnaVulDBcve.org01/28/2022accepted
100
1212219601/28/2022VulD...cveCVE-2005-10001cve.org01/28/2022accepted
100
8045310/08/2018VulD...sectracker_causeAccess control errorsecuritytracker.com10/08/2018accepted
100
8045110/08/2018VulD...sectracker_date1106006400 (01/18/2005)securitytracker.com10/08/2018accepted
100

81 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!