CVE-2010-1871

Scores

EPSS

0.937high93.7%
0%20%40%60%80%100%

Percentile: 93.7%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

CWEs

CWE-917

Related Vulnerabilities

Exploits

Exploit ID: CVE-2010-1871

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 36653

Source: exploitdb

URL: https://www.exploit-db.com/exploits/36653

Vulnerable Software (7)

Type: Configuration

Product: jboss-seam2

Operating System: rhel

Trait:
{  "fixed": "2.0.2.FP-1.ep1.24.el4"}

Source: redhat

Type: Configuration

Product: jboss-seam2

Operating System: rhel

Trait:
{  "fixed": "2.0.2.FP-1.ep1.24.el5"}

Source: redhat

Type: Configuration

Product: jbossas4

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: jboss_enterprise_application_platform

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*",          "vulnerable": true        }      ...

Source: nvd

Type: Configuration

Vendor: *

Product: oncommand_balance

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: oncommand_insight

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: oncommand_unified_manager

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*...

Source: nvd

End of list