Red Hat JBoss Enterprise Application Platform - Sensitive Information Disclosure
ID: CVE-2010-1429
Severity: medium
Author: R12W4N
Tags: cve2010,cve,jboss,eap,tomcat,exposure,redhat
Description
Section titled “Description”Red Hat JBoss Enterprise Application Platform 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 is susceptible to sensitive information disclosure. A remote attacker can obtain sensitive information about “deployed web contexts” via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression.
YAML Source
Section titled “YAML Source”id: CVE-2010-1429
info: name: Red Hat JBoss Enterprise Application Platform - Sensitive Information Disclosure author: R12W4N severity: medium description: | Red Hat JBoss Enterprise Application Platform 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 is susceptible to sensitive information disclosure. A remote attacker can obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression. impact: | An attacker can exploit this vulnerability to gain access to sensitive information, potentially leading to further attacks. remediation: | Apply the necessary patches or updates provided by Red Hat to fix the vulnerability. reference: - https://rhn.redhat.com/errata/RHSA-2010-0377.html - https://nvd.nist.gov/vuln/detail/CVE-2010-1429 - https://nvd.nist.gov/vuln/detail/CVE-2008-3273 - http://marc.info/?l=bugtraq&m=132698550418872&w=2 - http://securitytracker.com/id?1023918 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2010-1429 cwe-id: CWE-264 epss-score: 0.00573 epss-percentile: 0.77469 cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: redhat product: jboss_enterprise_application_platform shodan-query: - title:"JBoss" - cpe:"cpe:2.3:a:redhat:jboss_enterprise_application_platform" - http.title:"jboss" fofa-query: title="jboss" google-query: intitle:"jboss" tags: cve2010,cve,jboss,eap,tomcat,exposure,redhat
http: - method: GET path: - "{{BaseURL}}/status?full=true"
matchers-condition: and matchers: - type: word words: - "JVM" - "memory" - "localhost/" condition: and
- type: status status: - 200# digest: 490a0046304402203b489fa749391cc2ff7955e26813affd601665186bffb57b911c4600370f40ae022007bb662ead5eec60ba400030a01817b5a0ae60c78d481bda89a58960248bb7bc:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2010/CVE-2010-1429.yaml"