146 lines
4.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2010-1151",
"sourceIdentifier": "secalert@redhat.com",
"published": "2010-04-20T16:30:00.553",
"lastModified": "2025-04-11T00:51:21.963",
"vulnStatus": "Deferred",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Race condition in the mod_auth_shadow module for the Apache HTTP Server allows remote attackers to bypass authentication, and read and possibly modify data, via vectors related to improper interaction with an external helper application for validation of credentials."
},
{
"lang": "es",
"value": "Condici\u00f3n de carrera en el m\u00f3dulo mod_auth_shadow del servidor HTTP Apache permite a atacantes remotos evitar la autenticaci\u00f3n, leer y posiblemente modificar datos, a trav\u00e9s de vectores de ataque relacionados con errores en la interacci\u00f3n con una aplicaci\u00f3n de ayuda externa para la validaci\u00f3n de las credenciales."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:apache_http_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "180ABE44-C676-44DC-9461-6B70A055D50D"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041326.html",
"source": "secalert@redhat.com"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041340.html",
"source": "secalert@redhat.com"
},
{
"url": "http://secunia.com/advisories/39823",
"source": "secalert@redhat.com"
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:081",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/39538",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0908",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1148",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=578168",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041326.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041340.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/39823",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:081",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/39538",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0908",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1148",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=578168",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
2023-04-24 12:24:31 +02:00
}
]
}