var-201411-0146
Vulnerability from variot
The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the "IP Address and Domain Restrictions" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka "IIS Security Feature Bypass Vulnerability.". Microsoft Internet Information Services is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and gain unauthorized access; this may aid in launching further attacks. The title has been changed to better reflect the vulnerability information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201411-0146", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "internet information services", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "8.5" }, { "model": "internet information services", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "8.0" }, { "model": "iis", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "8.0 (microsoft windows 8 for 32-bit systems)" }, { "model": "iis", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "8.0 (microsoft windows 8 for x64-based systems)" }, { "model": "iis", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "8.0 (microsoft windows server 2012 for x64-based systems)" }, { "model": "iis", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "8.5 (microsoft windows 8.1 for 32-bit systems)" }, { "model": "iis", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "8.5 (microsoft windows 8.1 for x64-based systems)" }, { "model": "iis", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "8.5 (microsoft windows server 2012 r2 for x64-based systems)" }, { "model": "internet explorer", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "11" }, { "model": "iis", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "8.5" }, { "model": "iis", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "8.0" } ], "sources": [ { "db": "BID", "id": "70937" }, { "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "db": "CNNVD", "id": "CNNVD-201411-129" }, { "db": "NVD", "id": "CVE-2014-4078" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:microsoft:iis", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005399" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft", "sources": [ { "db": "BID", "id": "70937" } ], "trust": 0.3 }, "cve": "CVE-2014-4078", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2014-4078", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-4078", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2014-4078", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201411-129", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2014-4078", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-4078" }, { "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "db": "CNNVD", "id": "CNNVD-201411-129" }, { "db": "NVD", "id": "CVE-2014-4078" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the \"IP Address and Domain Restrictions\" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka \"IIS Security Feature Bypass Vulnerability.\". Microsoft Internet Information Services is prone to a security-bypass vulnerability. \nAn attacker can exploit this issue to bypass certain security restrictions and gain unauthorized access; this may aid in launching further attacks. The title has been changed to better reflect the vulnerability information", "sources": [ { "db": "NVD", "id": "CVE-2014-4078" }, { "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "db": "BID", "id": "70937" }, { "db": "VULMON", "id": "CVE-2014-4078" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-4078", "trust": 2.8 }, { "db": "BID", "id": "70937", "trust": 1.4 }, { "db": "SECTRACK", "id": "1031194", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2014-005399", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201411-129", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2014-4078", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-4078" }, { "db": "BID", "id": "70937" }, { "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "db": "CNNVD", "id": "CNNVD-201411-129" }, { "db": "NVD", "id": "CVE-2014-4078" } ] }, "id": "VAR-201411-0146", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-11-23T22:18:32.722000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MS14-076", "trust": 0.8, "url": "https://technet.microsoft.com/en-us/library/security/ms14-076.aspx" }, { "title": "Assessing Risk for the November 2014 Security Updates", "trust": 0.8, "url": "http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx" }, { "title": "MS14-076", "trust": 0.8, "url": "https://technet.microsoft.com/ja-jp/library/security/ms14-076.aspx" }, { "title": "For x64 Systematic Windows 8.1 Security update (KB2982998)", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52372" }, { "title": "Windows 8.1 Security update (KB2982998)", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52371" }, { "title": "For x64 Systematic Windows 8 Security update (KB2982998)", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52370" }, { "title": "Windows 8 Security update (KB2982998)", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52369" }, { "title": "", "trust": 0.1, "url": "https://github.com/burakd81/bsvg " }, { "title": "C844", "trust": 0.1, "url": "https://github.com/aRustyDev/C844 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-4078" }, { "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "db": "CNNVD", "id": "CNNVD-201411-129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "db": "NVD", "id": "CVE-2014-4078" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "http://www.securityfocus.com/bid/70937" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031194" }, { "trust": 1.1, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-076" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4078" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/vul/20141112-ms.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2014/at140045.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4078" }, { "trust": 0.8, "url": "http://www.npa.go.jp/cyberpolice/topics/?seq=14926" }, { "trust": 0.6, "url": "http://technet.microsoft.com/security/bulletin/ms14-076" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "https://technet.microsoft.com/en-us/library/security/ms14-051" }, { "trust": 0.3, "url": "http://technet.microsoft.com/en-us/security/bulletin/ms14-076" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/264.html" }, { "trust": 0.1, "url": "https://github.com/burakd81/bsvg" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/70937" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-4078" }, { "db": "BID", "id": "70937" }, { "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "db": "CNNVD", "id": "CNNVD-201411-129" }, { "db": "NVD", "id": "CVE-2014-4078" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2014-4078" }, { "db": "BID", "id": "70937" }, { "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "db": "CNNVD", "id": "CNNVD-201411-129" }, { "db": "NVD", "id": "CVE-2014-4078" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-11T00:00:00", "db": "VULMON", "id": "CVE-2014-4078" }, { "date": "2014-11-11T00:00:00", "db": "BID", "id": "70937" }, { "date": "2014-11-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "date": "2014-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-129" }, { "date": "2014-11-11T22:55:04.670000", "db": "NVD", "id": "CVE-2014-4078" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-12T00:00:00", "db": "VULMON", "id": "CVE-2014-4078" }, { "date": "2018-02-09T11:00:00", "db": "BID", "id": "70937" }, { "date": "2015-01-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005399" }, { "date": "2014-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-129" }, { "date": "2024-11-21T02:09:27.917000", "db": "NVD", "id": "CVE-2014-4078" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft IIS of IP Vulnerability to bypass ruleset of wildcard domain restriction in security function", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005399" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-129" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…