Vulnerability Name:

CVE-2010-2493 (CCN-60768)

Assigned:2010-07-28
Published:2010-07-28
Updated:2010-08-10
Summary:The default configuration of the deployment descriptor (aka web.xml) in picketlink-sts.war in (1) the security_saml quickstart, (2) the webservice_proxy_security quickstart, (3) the web-console application, (4) the http-invoker application, (5) the gpd-deployer application, (6) the jbpm-console application, (7) the contract application, and (8) the uddi-console application in JBoss Enterprise SOA Platform before 5.0.2 contains GET and POST http-method elements, which allows remote attackers to bypass intended access restrictions via a crafted HTTP request.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-16
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2010-2493

Source: CCN
Type: SA40681
JBoss Enterprise SOA Platform Multiple Security Issues

Source: SECUNIA
Type: Vendor Advisory
40681

Source: CCN
Type: OSVDB ID: 66660
JBoss Enterprise SOA Platform Multiple Script Crafted HTTP Request Application Restriction Bypass

Source: CCN
Type: JBoss Enterprise SOA Platform 5 Web page
5.0.2 Release Notes

Source: CONFIRM
Type: UNKNOWN
http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=614774

Source: XF
Type: UNKNOWN
jboss-soa-webconsole-sec-bypass(60768)

Source: CONFIRM
Type: UNKNOWN
https://jira.jboss.org/browse/SOA-2105

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:cp01:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:cp02:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:cp03:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:cp04:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:cp05:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:tp02:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:cp01:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:cp02:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:cp03:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:cp04:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:*:*:*:*:*:*:*:* (Version <= 5.0.1)

  • Configuration CCN 1:
  • cpe:/a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20102493000
    V
    CVE-2010-2493 on Ubuntu 12.04 LTS (precise) - medium.
    2010-08-10
    oval:com.ubuntu.trusty:def:20102493000
    V
    CVE-2010-2493 on Ubuntu 14.04 LTS (trusty) - medium.
    2010-08-10
    BACK
    redhat jboss enterprise soa platform 4.2.0
    redhat jboss enterprise soa platform 4.2.0 cp01
    redhat jboss enterprise soa platform 4.2.0 cp02
    redhat jboss enterprise soa platform 4.2.0 cp03
    redhat jboss enterprise soa platform 4.2.0 cp04
    redhat jboss enterprise soa platform 4.2.0 cp05
    redhat jboss enterprise soa platform 4.2.0 tp02
    redhat jboss enterprise soa platform 4.3.0
    redhat jboss enterprise soa platform 4.3.0 cp01
    redhat jboss enterprise soa platform 4.3.0 cp02
    redhat jboss enterprise soa platform 4.3.0 cp03
    redhat jboss enterprise soa platform 4.3.0 cp04
    redhat jboss enterprise soa platform 5.0.0
    redhat jboss enterprise soa platform *
    redhat jboss enterprise soa platform 5.0.0