First published: Fri Jan 29 2010(Updated: )
query.py in the query interface in ViewVC before 1.1.3 does not reject configurations that specify an unsupported authorizer for a root, which might allow remote attackers to bypass intended access restrictions via a query.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ViewVC | =1.0.2 | |
ViewVC | =1.0.1 | |
ViewVC | =1.0.5 | |
ViewVC | =1.1.0 | |
ViewVC | =1.1.1 | |
ViewVC | =1.0.3 | |
ViewVC | =1.0.4 | |
ViewVC | =1.0.6 | |
ViewVC | =1.0.8 | |
ViewVC | <=1.1.2 | |
ViewVC | =1.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0005 has been classified as a moderate severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2010-0005, upgrade to ViewVC version 1.1.3 or later, which addresses the vulnerability.
CVE-2010-0005 affects ViewVC versions 1.0.1 through 1.1.2.
Exploiting CVE-2010-0005 allows remote attackers to bypass access restrictions and potentially gain unauthorized access to restricted queries.
No, CVE-2010-0005 is not a remote code execution vulnerability; it primarily affects access control.