CVE-2010-1871
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.
Analysis
JBoss Seam 2 in Red Hat JBoss EAP 4.3.0 fails to sanitize JBoss Expression Language inputs, allowing remote attackers to achieve arbitrary code execution via crafted URL parameters when the Java Security Manager is misconfigured.
Technical Context
The CWE-917 EL injection flaw allows attackers to inject arbitrary JBoss Expression Language expressions via URL parameters. These expressions are evaluated server-side, and when the Java Security Manager is absent or misconfigured, they can invoke arbitrary Java methods including Runtime.exec().
Affected Products
['JBoss Seam 2 (jboss-seam2)', 'JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux']
Remediation
Upgrade JBoss EAP and Seam framework. Configure the Java Security Manager to restrict expression evaluation. Apply Red Hat security errata patches.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today