The default configuration of the deployment descriptor (aka web.xml) in picketlink-sts.war in (1) the security_saml quickstart, (2) the webservice_proxy_security quickstart, (3) the web-console application, (4) the http-invoker application, (5) the gpd-deployer application, (6) the jbpm-console application, (7) the contract application, and (8) the uddi-console application in JBoss Enterprise SOA Platform before 5.0.2 contains GET and POST http-method elements, which allows remote attackers to bypass intended access restrictions via a crafted HTTP request.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/40681 - Vendor Advisory | |
References | () http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=614774 - | |
References | () https://jira.jboss.org/browse/SOA-2105 - |
Information
Published : 2010-08-10 12:23
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2493
Mitre link : CVE-2010-2493
CVE.ORG link : CVE-2010-2493
JSON object : View
Products Affected
redhat
- jboss_enterprise_soa_platform
CWE
CWE-16
Configuration