First published: Tue Jun 15 2010(Updated: )
The default configuration of the build process in Dojo 0.4.x before 0.4.4, 1.0.x before 1.0.3, 1.1.x before 1.1.2, 1.2.x before 1.2.4, 1.3.x before 1.3.3, and 1.4.x before 1.4.2 has the copyTests=true and mini=false options, which makes it easier for remote attackers to have an unspecified impact via a request to a (1) test or (2) demo component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dojo Toolkit | =1.2.1 | |
Dojo Toolkit | =1.1 | |
Dojo Toolkit | =0.4.3 | |
Dojo Toolkit | =1.3.2 | |
Dojo Toolkit | =0.4.0 | |
Dojo Toolkit | =0.4.1 | |
Dojo Toolkit | =1.0.1 | |
Dojo Toolkit | =1.2.3 | |
Dojo Toolkit | =1.0 | |
Dojo Toolkit | =1.3.1 | |
Dojo Toolkit | =1.0.2 | |
Dojo Toolkit | =1.1.1 | |
Dojo Toolkit | =1.3 | |
Dojo Toolkit | =1.4.1 | |
Dojo Toolkit | =0.4.2 | |
Dojo Toolkit | =1.2.2 | |
Dojo Toolkit | =1.2 | |
Dojo Toolkit | =1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2276 has a medium severity rating due to its impact on the default configuration of the Dojo Toolkit.
To fix CVE-2010-2276, update the Dojo Toolkit to a version later than 0.4.4, 1.0.3, 1.1.2, 1.2.4, 1.3.3, or 1.4.2.
CVE-2010-2276 affects versions of the Dojo Toolkit from 0.4.x to 1.4.x prior to their respective fixed releases.
CVE-2010-2276 can enable remote attackers to exploit the vulnerability, potentially allowing them to manipulate the affected system.
Yes, CVE-2010-2276 is related to the insecure default configuration settings of 'copyTests=true' and 'mini=false' in certain versions of Dojo.