First published: Thu May 27 2010(Updated: )
Oracle Mojarra 1.2_14 and 2.0.2, as used in IBM WebSphere Application Server, Caucho Resin, and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Caucho Technology Resin | ||
IBM WebSphere Application Server with Web Server Plug-ins | ||
Oracle Mojarra JavaServer Faces | =1.2_14 | |
Oracle Mojarra JavaServer Faces | =2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2087 is considered a high severity vulnerability due to its potential for cross-site scripting and arbitrary code execution.
To fix CVE-2010-2087, upgrade Oracle Mojarra to version 2.0.3 or later, or apply relevant patches from your software vendor.
CVE-2010-2087 affects Oracle Mojarra versions 1.2_14 and 2.0.2, as well as applications using these versions including IBM WebSphere Application Server and Caucho Resin.
Yes, CVE-2010-2087 can lead to data breaches through cross-site scripting attacks and execution of arbitrary code, potentially exposing sensitive information.
CVE-2010-2087 is not specific to configurations; it affects the vulnerable versions of Oracle Mojarra regardless of application setup.