5
CVE-2010-2493
- EPSS 0.11%
- Published 10.08.2010 12:23:06
- Last modified 11.04.2025 00:51:21
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
The default configuration of the deployment descriptor (aka web.xml) in picketlink-sts.war in (1) the security_saml quickstart, (2) the webservice_proxy_security quickstart, (3) the web-console application, (4) the http-invoker application, (5) the gpd-deployer application, (6) the jbpm-console application, (7) the contract application, and (8) the uddi-console application in JBoss Enterprise SOA Platform before 5.0.2 contains GET and POST http-method elements, which allows remote attackers to bypass intended access restrictions via a crafted HTTP request.
Data is provided by the National Vulnerability Database (NVD)
Redhat ≫ Jboss Enterprise Soa Platform Version <= 5.0.1
Redhat ≫ Jboss Enterprise Soa Platform Version4.2.0
Redhat ≫ Jboss Enterprise Soa Platform Version4.2.0 Updatecp01
Redhat ≫ Jboss Enterprise Soa Platform Version4.2.0 Updatecp02
Redhat ≫ Jboss Enterprise Soa Platform Version4.2.0 Updatecp03
Redhat ≫ Jboss Enterprise Soa Platform Version4.2.0 Updatecp04
Redhat ≫ Jboss Enterprise Soa Platform Version4.2.0 Updatecp05
Redhat ≫ Jboss Enterprise Soa Platform Version4.2.0 Updatetp02
Redhat ≫ Jboss Enterprise Soa Platform Version4.3.0
Redhat ≫ Jboss Enterprise Soa Platform Version4.3.0 Updatecp01
Redhat ≫ Jboss Enterprise Soa Platform Version4.3.0 Updatecp02
Redhat ≫ Jboss Enterprise Soa Platform Version4.3.0 Updatecp03
Redhat ≫ Jboss Enterprise Soa Platform Version4.3.0 Updatecp04
Redhat ≫ Jboss Enterprise Soa Platform Version5.0.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.11% | 0.259 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|