FKIE_CVE-2010-2057
Vulnerability from fkie_nvd - Published: 2010-10-20 18:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
shared/util/StateUtils.java in Apache MyFaces 1.1.x before 1.1.8, 1.2.x before 1.2.9, and 2.0.x before 2.0.1 uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| apache | myfaces | 1.1.0 | |
| apache | myfaces | 1.1.1 | |
| apache | myfaces | 1.1.2 | |
| apache | myfaces | 1.1.3 | |
| apache | myfaces | 1.1.4 | |
| apache | myfaces | 1.1.5 | |
| apache | myfaces | 1.1.6 | |
| apache | myfaces | 1.1.7 | |
| apache | myfaces | 1.2.2 | |
| apache | myfaces | 1.2.3 | |
| apache | myfaces | 1.2.4 | |
| apache | myfaces | 1.2.5 | |
| apache | myfaces | 1.2.6 | |
| apache | myfaces | 1.2.7 | |
| apache | myfaces | 1.2.8 | |
| apache | myfaces | 2.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:myfaces:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1201479B-D49A-4AE4-906B-497BBCF49DAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9B4A602F-605E-44AB-A94C-FACA6644AEBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BC7980-C49E-494D-B7D4-6CA306628900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F686D80E-F592-4994-8648-61CE53D04CBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3F201327-7EE2-4B1D-A5A2-C789AC8F7D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B6C2699C-53E5-4523-9523-862E2F25682B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "67356C59-5DAD-496F-B199-58FD06358963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D102CD0D-2BA8-4915-85BF-715AD9D2EA90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:myfaces:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "672F3559-6044-44DA-8021-45736B2668DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "32E8219C-962D-4513-A463-E31D1D427C89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E2334B48-D635-487A-965C-400ED18E8896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4AC17DE4-F933-45D0-A202-62871C9F0B39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2A58DD4C-C8AD-4352-8AC5-85BDB291D4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C83E7CC2-64E7-45E7-8EEB-8448F59D7724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:myfaces:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "606B8964-297B-4D44-A603-9759B51151A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:myfaces:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2DA584-D6C3-42EC-9015-B76D4CA60CE9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "shared/util/StateUtils.java in Apache MyFaces 1.1.x before 1.1.8, 1.2.x before 1.2.9, and 2.0.x before 2.0.1 uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack."
},
{
"lang": "es",
"value": "shared/util/StateUtils.java en Apache MyFaces v1.1.x anterior a v1.1.8, v1.2.x anterior a v1.2.9, y v2.0.x anterior a v2.0.1 utiliza un cifrado View State sin un Codigo de Autenticaci\u00f3n de Mensaje (MAC), lo que cual facilita a los atacantes remotos realizar modificaciones con \u00e9xito de el View State mediante un ataque de relleno."
}
],
"id": "CVE-2010-2057",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-10-20T18:00:02.503",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc/myfaces/shared/trunk/core/src/main/java/org/apache/myfaces/shared/util/StateUtils.java?r1=943327\u0026r2=951801"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=623799"
},
{
"source": "secalert@redhat.com",
"url": "https://issues.apache.org/jira/browse/MYFACES-2749"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc/myfaces/shared/trunk/core/src/main/java/org/apache/myfaces/shared/util/StateUtils.java?r1=943327\u0026r2=951801"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=623799"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.apache.org/jira/browse/MYFACES-2749"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…