{"api_version":"1","generated_at":"2026-04-25T01:10:22+00:00","cve":"CVE-2000-0629","urls":{"html":"https://cve.report/CVE-2000-0629","api":"https://cve.report/api/cve/CVE-2000-0629.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2000-0629","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2000-0629"},"summary":{"title":"CVE-2000-0629","description":"The default configuration of the Sun Java web server 2.0 and earlier allows remote attackers to execute arbitrary commands by uploading Java code to the server via board.html, then directly calling the JSP compiler servlet.","state":"PUBLISHED","assigner":"mitre","published_at":"2000-07-12 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0163.html","name":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0163.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/1459","name":"http://www.securityfocus.com/bid/1459","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Sun Java Web Server Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html","name":"http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Java Web Server: CERT Advisory CA-2000-02","mime":"text/html","httpstatus":"400","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2000-0629","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2000-0629","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2000","cve_id":"629","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_system_web_server","cpe6":"1.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"629","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_system_web_server","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T05:21:31.329Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"1459","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/1459"},{"name":"20000711 Sun's Java Web Server remote command execution vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0163.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2000-07-11T00:00:00.000Z","descriptions":[{"lang":"en","value":"The default configuration of the Sun Java web server 2.0 and earlier allows remote attackers to execute arbitrary commands by uploading Java code to the server via board.html, then directly calling the JSP compiler servlet."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2014-11-22T01:57:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"1459","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/1459"},{"name":"20000711 Sun's Java Web Server remote command execution vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0163.html"},{"tags":["x_refsource_MISC"],"url":"http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2000-0629","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The default configuration of the Sun Java web server 2.0 and earlier allows remote attackers to execute arbitrary commands by uploading Java code to the server via board.html, then directly calling the JSP compiler servlet."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"1459","refsource":"BID","url":"http://www.securityfocus.com/bid/1459"},{"name":"20000711 Sun's Java Web Server remote command execution vulnerability","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0163.html"},{"name":"http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html","refsource":"MISC","url":"http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2000-0629","datePublished":"2000-08-03T04:00:00.000Z","dateReserved":"2000-08-02T00:00:00.000Z","dateUpdated":"2024-08-08T05:21:31.329Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2000-07-12 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_system_web_server:1.1.3:*:*:*:*:*:*:*","matchCriteriaId":"8812EC0B-E426-43D7-9E2B-542CAAAB0D30"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_system_web_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"6E8894D1-5147-4065-AA67-ECFE676ED899"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2000","CveId":"629","Ordinal":"1","Title":"CVE-2000-0629","CVE":"CVE-2000-0629","Year":"2000"},"notes":[{"CveYear":"2000","CveId":"629","Ordinal":"1","NoteData":"The default configuration of the Sun Java web server 2.0 and earlier allows remote attackers to execute arbitrary commands by uploading Java code to the server via board.html, then directly calling the JSP compiler servlet.","Type":"Description","Title":"CVE-2000-0629"},{"CveYear":"2000","CveId":"629","Ordinal":"2","NoteData":"2000-08-03","Type":"Other","Title":"Published"},{"CveYear":"2000","CveId":"629","Ordinal":"3","NoteData":"2014-11-21","Type":"Other","Title":"Modified"}]}}}