ghsa-fj52-r29c-ggwc
Vulnerability from github
Published
2022-04-30 18:20
Modified
2022-04-30 18:20
Details
The xp_runwebtask stored procedure in the Web Tasks component of Microsoft SQL Server 7.0 and 2000, Microsoft Data Engine (MSDE) 1.0, and Microsoft Desktop Engine (MSDE) 2000 can be executed by PUBLIC, which allows an attacker to gain privileges by updating a webtask that is owned by the database owner through the msdb.dbo.mswebtasks table, which does not have strong permissions.
{ "affected": [], "aliases": [ "CVE-2002-1145" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2002-10-28T05:00:00Z", "severity": "HIGH" }, "details": "The xp_runwebtask stored procedure in the Web Tasks component of Microsoft SQL Server 7.0 and 2000, Microsoft Data Engine (MSDE) 1.0, and Microsoft Desktop Engine (MSDE) 2000 can be executed by PUBLIC, which allows an attacker to gain privileges by updating a webtask that is owned by the database owner through the msdb.dbo.mswebtasks table, which does not have strong permissions.", "id": "GHSA-fj52-r29c-ggwc", "modified": "2022-04-30T18:20:37Z", "published": "2022-04-30T18:20:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1145" }, { "type": "WEB", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-061" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=103487044122900\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=ntbugtraq\u0026m=103486356413404\u0026w=2" }, { "type": "WEB", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030126-ms02-061.shtml" }, { "type": "WEB", "url": "http://www.iss.net/security_center/static/10388.php" }, { "type": "WEB", "url": "http://www.nextgenss.com/advisories/mssql-webtasks.txt" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/5980" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.