{"api_version":"1","generated_at":"2026-04-29T22:20:13+00:00","cve":"CVE-2005-0316","urls":{"html":"https://cve.report/CVE-2005-0316","api":"https://cve.report/api/cve/CVE-2005-0316.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-0316","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-0316"},"summary":{"title":"CVE-2005-0316","description":"WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-01-28 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.securityfocus.com/bid/12394","name":"http://www.securityfocus.com/bid/12394","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"WebWasher Classic HTTP CONNECT Unauthorized Access Weakness","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/14058","name":"http://secunia.com/advisories/14058","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - WebWasher Classic Server Mode Proxying Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=110693045507245&w=2","name":"http://marc.info/?l=bugtraq&m=110693045507245&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'WebWasher Classic - HTTP CONNECT weakness' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1013036","name":"http://securitytracker.com/id?1013036","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - WebWasher Classic Lets Remote Users Connect to Localhost Ports","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19144","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19144","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oliverkarow.de/research/WebWasherCONNECT.txt","name":"http://www.oliverkarow.de/research/WebWasherCONNECT.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-0316","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0316","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"316","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"webwasher","cpe5":"webwasher_classic","cpe6":"2.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"316","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"webwasher","cpe5":"webwasher_classic","cpe6":"3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T21:05:25.625Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"14058","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/14058"},{"name":"12394","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/12394"},{"name":"20050128 WebWasher Classic - HTTP CONNECT weakness","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=110693045507245&w=2"},{"name":"webwasher-classic-connect-gain-access(19144)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19144"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.oliverkarow.de/research/WebWasherCONNECT.txt"},{"name":"1013036","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1013036"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-01-28T00:00:00.000Z","descriptions":[{"lang":"en","value":"WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-10T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"14058","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/14058"},{"name":"12394","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/12394"},{"name":"20050128 WebWasher Classic - HTTP CONNECT weakness","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=110693045507245&w=2"},{"name":"webwasher-classic-connect-gain-access(19144)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19144"},{"tags":["x_refsource_MISC"],"url":"http://www.oliverkarow.de/research/WebWasherCONNECT.txt"},{"name":"1013036","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1013036"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-0316","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"14058","refsource":"SECUNIA","url":"http://secunia.com/advisories/14058"},{"name":"12394","refsource":"BID","url":"http://www.securityfocus.com/bid/12394"},{"name":"20050128 WebWasher Classic - HTTP CONNECT weakness","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=110693045507245&w=2"},{"name":"webwasher-classic-connect-gain-access(19144)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19144"},{"name":"http://www.oliverkarow.de/research/WebWasherCONNECT.txt","refsource":"MISC","url":"http://www.oliverkarow.de/research/WebWasherCONNECT.txt"},{"name":"1013036","refsource":"SECTRACK","url":"http://securitytracker.com/id?1013036"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-0316","datePublished":"2005-02-10T05:00:00.000Z","dateReserved":"2005-02-10T00:00:00.000Z","dateUpdated":"2024-08-07T21:05:25.625Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-01-28 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webwasher:webwasher_classic:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"BDD5629F-8E42-4A68-B04A-C4B35DDFDE34"},{"vulnerable":true,"criteria":"cpe:2.3:a:webwasher:webwasher_classic:3.3:*:*:*:*:*:*:*","matchCriteriaId":"A3B24638-55F6-4366-8EE2-1F0FCE1AD3AC"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"316","Ordinal":"1","Title":"CVE-2005-0316","CVE":"CVE-2005-0316","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"316","Ordinal":"1","NoteData":"WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions.","Type":"Description","Title":"CVE-2005-0316"},{"CveYear":"2005","CveId":"316","Ordinal":"2","NoteData":"2005-02-10","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"316","Ordinal":"3","NoteData":"2017-07-10","Type":"Other","Title":"Modified"}]}}}