CVE-2010-3700
Published Oct 29, 2010
Last updated 6 years ago
Overview
- Description
- VMware SpringSource Spring Security 2.x before 2.0.6 and 3.x before 3.0.4, and Acegi Security 1.0.0 through 1.0.7, as used in IBM WebSphere Application Server (WAS) 6.1 and 7.0, allows remote attackers to bypass security constraints via a path parameter.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:acegisecurity:acegi-security:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDA06D12-CC44-455D-AB77-7DD48B73B621" }, { "criteria": "cpe:2.3:a:acegisecurity:acegi-security:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F849A68-C6CD-49A7-A66E-81A672A01767" }, { "criteria": "cpe:2.3:a:acegisecurity:acegi-security:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28C0DF47-9736-41F7-ACCB-713583367CE9" }, { "criteria": "cpe:2.3:a:acegisecurity:acegi-security:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34562257-61C5-4F8B-A16D-82560E6B6D89" }, { "criteria": "cpe:2.3:a:acegisecurity:acegi-security:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD592BAE-7E31-4ACF-8F71-D3955EF6D4F1" }, { "criteria": "cpe:2.3:a:acegisecurity:acegi-security:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F41693E-F9B8-4A14-9390-A5736D8CBB9D" }, { "criteria": "cpe:2.3:a:acegisecurity:acegi-security:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEB50F4C-3612-42C7-8CF6-1D42B6B54B3F" }, { "criteria": "cpe:2.3:a:acegisecurity:acegi-security:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60BA3BEA-311D-43E1-BA9C-009223339082" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49404CD7-2E0D-479C-AAC4-0B84AEFB724E" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D78BB50-F222-46BC-AEAA-8B1DADE2E38C" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49CC9A95-6EA8-4F95-BBD1-D306D831636D" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F694360-D48E-4ECB-9B32-8A83803E0A68" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EE84C44-3D48-4F5B-B168-80F583E84C04" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C672302-C952-4EC0-A833-34382F7CC47A" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D802BACB-E48F-4430-9C93-5029B596DDBA" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FED53F75-200C-40F4-A282-E0DBDBDB4DE1" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DD07175-064C-46D2-B76A-17A642FB7D75" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E96BD784-6C39-4FC2-AF5D-C21465D17925" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B9CDD56-921C-4FAF-87E2-14B91EC1A93D" }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0905C80-A1BA-49CD-90CA-9270ECC3940C" } ], "operator": "OR" } ], "operator": "AND" } ]