Vulnerability Name:

CVE-2010-0534 (CCN-57297)

Assigned:2010-03-29
Published:2010-03-29
Updated:2010-06-21
Summary:Wiki Server in Apple Mac OS X 10.6 before 10.6.3 does not enforce the service access control list (SACL) for weblogs during weblog creation, which allows remote authenticated users to publish content via HTTP requests.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2010-0534

Source: APPLE
Type: Vendor Advisory
APPLE-SA-2010-03-29-1

Source: CCN
Type: SA39158
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: CCN
Type: Apple Web site
About the security content of Security Update 2010-002 / Mac OS X v10.6.3

Source: CONFIRM
Type: Patch, Vendor Advisory
http://support.apple.com/kb/HT4077

Source: CCN
Type: OSVDB ID: 63369
Apple Mac OS X Wiki Server Unspecified Weblog Creation Restriction Bypass

Source: CCN
Type: BID-39020
RETIRED: Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities

Source: XF
Type: UNKNOWN
macosx-wikiserver-sacl-security-bypass(57297)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:apple:mac_os_x_server:10.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple mac os x 10.6.0
    apple mac os x 10.6.1
    apple mac os x 10.6.2
    apple mac os x server 10.6.0
    apple mac os x server 10.6.1
    apple mac os x server 10.6.2
    apple mac os x server 10.6
    apple mac os x 10.6
    apple mac os x server 10.6.2
    apple mac os x 10.6.2