2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2010-1622" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2010-06-21T16:30:01.180" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:14:49.797" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file."
} ,
{
"lang" : "es" ,
"value" : "SpringSource Spring Framework v2.5.x anteriores a v2.5.6.SEC02, v2.5.7 anteriores a v2.5.7.SR01, y v3.0.x anteriores a v3.0.3 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una petici\u00f3n HTTP que contenga class.classLoader.URLs[0]=jar: seguida por una URL de un fichero .jar modificado."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:S/C:P/I:P/A:P" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 6.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 6.8 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-94"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:fusion_middleware:7.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A9B040F-4062-45C1-A659-B5E9242B54CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6DF57046-4537-475E-B25E-2375492850DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:fusion_middleware:11.1.1.8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4227A17D-C070-406A-BEB7-6D43F3A0E98A"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:2.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5ECA0EF4-6BEA-4464-B098-37C0342AEDDF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:2.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4DDA5A7-62A4-471A-9B01-D54CF560BF56"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:2.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B977B334-EC1A-45BD-976D-3DF3332ADA90"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:2.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6DC37B55-E7DF-4426-B1E2-2644078EDD19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:2.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A939B963-7C6C-4617-A695-A9CC4FC774EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:2.5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB2D44CB-BBBF-45DE-B3C9-2BD2625BC8E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:2.5.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F709DAAC-AA32-4D37-9E0C-A014FB519697"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:2.5.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC2B4BF5-FFAE-475F-AF1B-835497BF86D9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:3.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "62111DAE-3E05-4D95-8B34-E2EFB6142DCA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:3.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A9F796E-340B-4FF5-9322-94E57D7BCEE6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:springsource:spring_framework:3.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8BA17FD-BC52-4D84-9753-5D41D3BC35B4"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://geronimo.apache.org/21x-security-report.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://geronimo.apache.org/22x-security-report.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/41016" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://secunia.com/advisories/41025" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://secunia.com/advisories/43087" ,
"source" : "secalert@redhat.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.exploit-db.com/exploits/13918" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0175.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/511877" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/40954" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securitytracker.com/id/1033898" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.springsource.com/security/cve-2010-1622" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0237" ,
"source" : "secalert@redhat.com"
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://geronimo.apache.org/21x-security-report.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://geronimo.apache.org/22x-security-report.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/41016" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/41025" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/43087" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.exploit-db.com/exploits/13918" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0175.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/511877" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/40954" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securitytracker.com/id/1033898" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.springsource.com/security/cve-2010-1622" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0237" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
2024-11-22 11:14:00 +00:00
] ,
"evaluatorComment" : "The previous CVSS assessment 5.1 (AV:N/AC:M/Au:N/C:P/I:P/A:P) was provided at the time of initial analysis based on the best available published information at that time. The score has be updated to reflect the impact to Oracle products per <a href=http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html> Oracle Critical Patch Update Advisory - October 2015 </a>. Other products listed as vulnerable may or may not be similarly impacted."
2023-04-24 12:24:31 +02:00
}