Lucene search

K
cve[email protected]CVE-2011-2196
HistoryJul 27, 2011 - 2:55 a.m.

CVE-2011-2196

2011-07-2702:55:01
CWE-264
web.nvd.nist.gov
32
cve
jboss
seam
java
code execution
security vulnerability

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.4 High

AI Score

Confidence

Low

0.013 Low

EPSS

Percentile

86.2%

jboss-seam.jar in the JBoss Seam 2 framework 2.2.x and earlier, as distributed in Red Hat JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0; JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3.0, 4.3.0.CP09, and 5.1.1; and JBoss Enterprise Web Platform 5.1.1, does not properly restrict use of Expression Language (EL) statements in FacesMessages during page exception handling, which allows remote attackers to execute arbitrary Java code via a crafted URL to an application. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1484.

Affected configurations

NVD
Node
redhatjboss_enterprise_application_platformMatch4.3.0
OR
redhatjboss_enterprise_application_platformMatch4.3.0cp09
OR
redhatjboss_enterprise_application_platformMatch5.1.1
OR
redhatjboss_enterprise_soa_platformMatch4.3.0cp05
OR
redhatjboss_enterprise_soa_platformMatch5.1.0
OR
redhatjboss_enterprise_web_platformMatch5.1.1
OR
redhatjboss_seam_2_frameworkRange2.2.2
OR
redhatjboss_seam_2_frameworkMatch2.0.0beta1
OR
redhatjboss_seam_2_frameworkMatch2.0.0cr1
OR
redhatjboss_seam_2_frameworkMatch2.0.0cr2
OR
redhatjboss_seam_2_frameworkMatch2.0.0cr3
OR
redhatjboss_seam_2_frameworkMatch2.0.0ga
OR
redhatjboss_seam_2_frameworkMatch2.0.1cr1
OR
redhatjboss_seam_2_frameworkMatch2.0.1cr2
OR
redhatjboss_seam_2_frameworkMatch2.0.1ga
OR
redhatjboss_seam_2_frameworkMatch2.0.2cr1
OR
redhatjboss_seam_2_frameworkMatch2.0.2cr2
OR
redhatjboss_seam_2_frameworkMatch2.0.2ga
OR
redhatjboss_seam_2_frameworkMatch2.0.2sp1
OR
redhatjboss_seam_2_frameworkMatch2.0.3cr1
OR
redhatjboss_seam_2_frameworkMatch2.1.0alpha1
OR
redhatjboss_seam_2_frameworkMatch2.1.0beta1
OR
redhatjboss_seam_2_frameworkMatch2.1.0cr1
OR
redhatjboss_seam_2_frameworkMatch2.1.0ga
OR
redhatjboss_seam_2_frameworkMatch2.1.0sp1
OR
redhatjboss_seam_2_frameworkMatch2.1.1cr1
OR
redhatjboss_seam_2_frameworkMatch2.1.1cr2
OR
redhatjboss_seam_2_frameworkMatch2.1.1ga
OR
redhatjboss_seam_2_frameworkMatch2.1.2
OR
redhatjboss_seam_2_frameworkMatch2.1.2cr1
OR
redhatjboss_seam_2_frameworkMatch2.1.2cr2
OR
redhatjboss_seam_2_frameworkMatch2.2.0cr1
OR
redhatjboss_seam_2_frameworkMatch2.2.0ga
OR
redhatjboss_seam_2_frameworkMatch2.2.1
OR
redhatjboss_seam_2_frameworkMatch2.2.1cr1
OR
redhatjboss_seam_2_frameworkMatch2.2.1cr2
OR
redhatjboss_seam_2_frameworkMatch2.2.1cr3

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.4 High

AI Score

Confidence

Low

0.013 Low

EPSS

Percentile

86.2%