CVE-2010-2493

Severity

50%

Complexity

99%

Confidentiality

48%

The default configuration of the deployment descriptor (aka web.xml) in picketlink-sts.war in (1) the security_saml quickstart, (2) the webservice_proxy_security quickstart, (3) the web-console application, (4) the http-invoker application, (5) the gpd-deployer application, (6) the jbpm-console application, (7) the contract application, and (8) the uddi-console application in JBoss Enterprise SOA Platform before 5.0.2 contains GET and POST http-method elements, which allows remote attackers to bypass intended access restrictions via a crafted HTTP request.

The default configuration of the deployment descriptor (aka web.xml) in picketlink-sts.war in (1) the security_saml quickstart, (2) the webservice_proxy_security quickstart, (3) the web-console application, (4) the http-invoker application, (5) the gpd-deployer application, (6) the jbpm-console application, (7) the contract application, and (8) the uddi-console application in JBoss Enterprise SOA Platform before 5.0.2 contains GET and POST http-method elements, which allows remote attackers to bypass intended access restrictions via a crafted HTTP request.

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).

Overview

Type

Red Hat JBOSS Enterprise SOA Platform

First reported 14 years ago

2010-08-10 12:23:00

Last updated 14 years ago

2010-08-10 12:23:00

Affected Software

Red Hat JBOSS Enterprise SOA Platform 4.2.0

4.2.0

Red Hat JBOSS Enterprise SOA Platform 4.2.0 CP01

4.2.0

Red Hat JBOSS Enterprise SOA Platform 4.2.0 CP02

4.2.0

Red Hat JBOSS Enterprise SOA Platform 4.2.0 CP03

4.2.0

Red Hat JBOSS Enterprise SOA Platform 4.2.0 CP05

4.2.0

Red Hat JBOSS Enterprise SOA Platform 4.2.0:cp05

4.2.0

Red Hat JBOSS Enterprise SOA Platform 4.2.0 TP02

4.2.0

Red Hat JBOSS Enterprise SOA Platform 4.3.0

4.3.0

Red Hat JBOSS Enterprise SOA Platform 4.3.0 CP01

4.3.0

Red Hat JBOSS Enterprise SOA Platform 4.3.0 CP02

4.3.0

Red Hat JBOSS Enterprise SOA Platform 4.3.0 CP03

4.3.0

Red Hat JBOSS Enterprise SOA Platform 4.3.0 CP04

4.3.0

Red Hat JBOSS Enterprise SOA Platform 5.0.0

5.0.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.