Update and rename cves/2008/CVE-2008-3273.yaml to cves/2010/CVE-2010-1429.yaml

patch-1
Ritik Chaddha 2023-01-18 12:25:26 +05:30 committed by GitHub
parent e79b0a3e0a
commit 607795fcb7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 35 additions and 26 deletions

View File

@ -1,26 +0,0 @@
id: CVE-2008-3273_JBoss_EAP_Sensitive_Information_Leakage_Server_Status
info:
name: CVE-2008-3273 JBoss EAP Sensitive Information Leakage Server Status
description: CVE-2008-3273, CVE-2010-1429
author: R12W4N
severity: low
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2008-3273
tags: jboss,eap,tomcat
requests:
- method: GET
path:
- "{{BaseURL}}/status?full=true"
matchers-condition: and
matchers:
- type: word
words:
- "JVM"
- "memory"
condition: and
- type: status
status:
- 200

View File

@ -0,0 +1,35 @@
id: CVE-2010-1429
info:
name: JBossEAP - Sensitive Information Disclosure
author: R12W4N
severity: low
description: |
Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1429
- https://nvd.nist.gov/vuln/detail/CVE-2008-3273
classification:
cve-id: CVE-2010-1429
metadata:
verified: true
shodan-query: title:"JBoss"
tags: cve,cve2010,jboss,eap,tomcat,exposure
requests:
- method: GET
path:
- "{{BaseURL}}/status?full=true"
matchers-condition: and
matchers:
- type: word
words:
- "JVM"
- "memory"
- "localhost/"
condition: and
- type: status
status:
- 200