cve/2010/CVE-2010-1871.md

33 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2010-1871](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1871)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/BarrettWyman/JavaTools
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Spid3rm4n/CTF-WEB-Challenges
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/dudek-marcin/Poc-Exp
- https://github.com/fupinglee/JavaTools
- https://github.com/orangetw/My-CTF-Web-Challenges
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/t3hp0rP/hitconDockerfile
- https://github.com/therebelbeta/My-CTF-Web-Challenges