First published: Thu Jul 15 2010(Updated: )
The default configuration of the deployment descriptor (aka web.xml) in picketlink-sts.war in (1) the security_saml quickstart, (2) the webservice_proxy_security quickstart, (3) the web-console application, (4) the http-invoker application, (5) the gpd-deployer application, (6) the jbpm-console application, (7) the contract application, and (8) the uddi-console application in JBoss Enterprise SOA Platform before 5.0.2 contains GET and POST http-method elements, which allows remote attackers to bypass intended access restrictions via a crafted HTTP request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise SOA Platform | =4.3.0 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-tp02 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp02 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp01 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp05 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp04 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp04 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp01 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp03 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp03 | |
Red Hat JBoss Enterprise SOA Platform | =5.0.0 | |
Red Hat JBoss Enterprise SOA Platform | <=5.0.1 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2493 is classified as a moderate severity vulnerability.
To fix CVE-2010-2493, review and update the web.xml configuration in the affected applications to align with secure deployment practices.
CVE-2010-2493 affects specific versions of Red Hat JBoss Enterprise SOA Platform, including versions from 4.2.0 to 5.0.0.
The applications affected by CVE-2010-2493 include security_saml quickstart, webservice_proxy_security quickstart, web-console, and others in the deployment descriptor.
Yes, Red Hat has provided patches in updates for the affected versions, which should be applied to mitigate the vulnerability.