CVE-2010-1622
Published Jun 21, 2010
Last updated 2 years ago
Overview
- Description
- SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 6.4
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Evaluator
- Comment
- The previous CVSS assessment 5.1 (AV:N/AC:M/Au:N/C:P/I:P/A:P) was provided at the time of initial analysis based on the best available published information at that time. The score has be updated to reflect the impact to Oracle products per <a href=http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html> Oracle Critical Patch Update Advisory - October 2015 </a>. Other products listed as vulnerable may or may not be similarly impacted.
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:fusion_middleware:7.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A9B040F-4062-45C1-A659-B5E9242B54CD" }, { "criteria": "cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DF57046-4537-475E-B25E-2375492850DD" }, { "criteria": "cpe:2.3:a:oracle:fusion_middleware:11.1.1.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4227A17D-C070-406A-BEB7-6D43F3A0E98A" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:springsource:spring_framework:2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ECA0EF4-6BEA-4464-B098-37C0342AEDDF" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4DDA5A7-62A4-471A-9B01-D54CF560BF56" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B977B334-EC1A-45BD-976D-3DF3332ADA90" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DC37B55-E7DF-4426-B1E2-2644078EDD19" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:2.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A939B963-7C6C-4617-A695-A9CC4FC774EE" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:2.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB2D44CB-BBBF-45DE-B3C9-2BD2625BC8E7" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:2.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F709DAAC-AA32-4D37-9E0C-A014FB519697" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:2.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC2B4BF5-FFAE-475F-AF1B-835497BF86D9" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62111DAE-3E05-4D95-8B34-E2EFB6142DCA" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A9F796E-340B-4FF5-9322-94E57D7BCEE6" }, { "criteria": "cpe:2.3:a:springsource:spring_framework:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8BA17FD-BC52-4D84-9753-5D41D3BC35B4" } ], "operator": "OR" } ] } ]