357 lines
9.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2010-1428",
"sourceIdentifier": "secalert@redhat.com",
"published": "2010-04-28T22:30:00.793",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to obtain sensitive information via an unspecified request that uses a different method."
},
{
"lang": "es",
"value": "La consola Web(tambi\u00e9n conocida como web-console) en JBossAs en Red Hat JBoss Enterprise Application Platform (tambi\u00e9n conocido como JBoss EAP o JBEAP) v4.2 anterior a v4.2.0.CP09 y v4.3 anterior a v4.3.0.CP08 realiza control de acceso solo para los m\u00e9todos GET y POST, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una petici\u00f3n sin especificar que utiliza un m\u00e9todod diferente"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
2023-04-24 12:24:31 +02:00
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"cisaExploitAdd": "2022-05-25",
"cisaActionDue": "2022-06-15",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Red Hat JBoss Information Disclosure Vulnerability",
2023-04-24 12:24:31 +02:00
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
2023-04-24 12:24:31 +02:00
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-749"
}
]
2023-04-24 12:24:31 +02:00
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "0D3EADF4-5496-4F5F-B0A6-DBF959C4D7B9"
2023-04-24 12:24:31 +02:00
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "FE2A6BEF-2917-437C-A1D5-EE1601FC0A5F"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Mailing List"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Mailing List"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "http://secunia.com/advisories/39563",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://securitytracker.com/id?1023917",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "http://www.securityfocus.com/bid/39710",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "http://www.vupen.com/english/advisories/2010/0992",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
2023-04-24 12:24:31 +02:00
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585899",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58148",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0376.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
2023-04-24 12:24:31 +02:00
"Vendor Advisory"
]
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0377.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0378.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0379.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/39563",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023917",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/39710",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2010/0992",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585899",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58148",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0376.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0377.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0378.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2010-0379.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}