JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2013-05/0117.html | Broken Link |
http://www.redhat.com/support/errata/RHSA-2010-0564.html | Broken Link |
http://www.securityfocus.com/bid/41994 | Broken Link Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1024253 | Broken Link Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2010/1929 | Broken Link Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=615956 | Issue Tracking |
https://exchange.xforce.ibmcloud.com/vulnerabilities/60794 | Third Party Advisory VDB Entry |
https://security.netapp.com/advisory/ntap-20161017-0001/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2010-08-05 13:23
Updated : 2024-07-24 16:52
NVD link : CVE-2010-1871
Mitre link : CVE-2010-1871
CVE.ORG link : CVE-2010-1871
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform
- enterprise_linux
netapp
- oncommand_balance
- oncommand_unified_manager
- oncommand_insight
CWE
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')