From 86e46f69bb814ee9fc69076cf5b4a8e16a10d1be Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Mon, 30 Jan 2023 13:46:59 -0500 Subject: [PATCH] Enhancement: cves/2010/CVE-2010-1429.yaml by md --- cves/2010/CVE-2010-1429.yaml | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/cves/2010/CVE-2010-1429.yaml b/cves/2010/CVE-2010-1429.yaml index 45461e4e2f..52df63062e 100644 --- a/cves/2010/CVE-2010-1429.yaml +++ b/cves/2010/CVE-2010-1429.yaml @@ -1,18 +1,20 @@ id: CVE-2010-1429 info: - name: JBossEAP - Sensitive Information Disclosure + name: Red Hat JBoss Enterprise Application Platform - Sensitive Information Disclosure author: R12W4N severity: low description: | - Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression. + Red Hat JBoss Enterprise Application Platform 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 is susceptible to sensitive information disclosure. A remote attacker can obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2010-1429 - - https://nvd.nist.gov/vuln/detail/CVE-2008-3273 - https://rhn.redhat.com/errata/RHSA-2010-0377.html - - http://securitytracker.com/id?1023918 + - https://nvd.nist.gov/vuln/detail/CVE-2010-1429 + - https://nvd.nist.gov/vuln/detail/CVE-2008-3273 classification: cve-id: CVE-2010-1429 + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cwe-id: CWE-200 metadata: shodan-query: title:"JBoss" verified: "true" @@ -35,3 +37,5 @@ requests: - type: status status: - 200 + +# Enhanced by md on 2023/01/30