[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-1871

Date: (C)2010-08-05   (M)2017-08-18
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.

Reference:
SECTRACK-1024253
http://archives.neohapsis.com/archives/bugtraq/2013-05/0117.html
BID-41994
ADV-2010-1929
RHSA-2010:0564
https://bugzilla.redhat.com/show_bug.cgi?id=615956
seam-expressions-code-execution(60794)

CPE    1
cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0
CWE    1
CWE-20

© 2013 SecPod Technologies