CVE-2010-1507
Published Sep 3, 2010
Last updated 14 years ago
Overview
- Description
- WebYaST in yast2-webclient in SUSE Linux Enterprise (SLE) 11 on the WebYaST appliance uses a fixed secret key that is embedded in the appliance's image, which allows remote attackers to spoof session cookies by leveraging knowledge of this key.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-255
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:suse_linux:11:-:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB545D91-1C4C-4692-B01A-B8DAE4A958BE" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:novell:webyast_appliance:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BFA7A74B-DB88-4D3E-8CE9-61E99EFC74FD" } ], "operator": "OR" } ], "operator": "AND" } ]