First published: Fri Oct 29 2010(Updated: )
VMware SpringSource Spring Security 2.x before 2.0.6 and 3.x before 3.0.4, and Acegi Security 1.0.0 through 1.0.7, as used in IBM WebSphere Application Server (WAS) 6.1 and 7.0, allows remote attackers to bypass security constraints via a path parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Acegisecurity Acegi-security | =1.0.0 | |
Acegisecurity Acegi-security | =1.0.1 | |
Acegisecurity Acegi-security | =1.0.2 | |
Acegisecurity Acegi-security | =1.0.3 | |
Acegisecurity Acegi-security | =1.0.4 | |
Acegisecurity Acegi-security | =1.0.5 | |
Acegisecurity Acegi-security | =1.0.6 | |
Acegisecurity Acegi-security | =1.0.7 | |
VMware SpringSource Spring Security | =2.0.0 | |
VMware SpringSource Spring Security | =2.0.1 | |
VMware SpringSource Spring Security | =2.0.2 | |
VMware SpringSource Spring Security | =2.0.3 | |
VMware SpringSource Spring Security | =2.0.4 | |
VMware SpringSource Spring Security | =2.0.5 | |
VMware SpringSource Spring Security | =3.0.0 | |
VMware SpringSource Spring Security | =3.0.1 | |
VMware SpringSource Spring Security | =3.0.2 | |
VMware SpringSource Spring Security | =3.0.3 | |
Ibm Websphere Application Server | =6.1 | |
Ibm Websphere Application Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.