VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 2) [ Download XML
CVE-2010-3852
luci: The default configuration of Luci 0.22.4 and earlie...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3852

Original

The default configuration of Luci 0.22.4 and earlier in Red Hat Conga uses "[INSERT SECRET HERE]" as its secret key for cookies, which makes it easier for remote attackers to bypass repoze.who authentication via a forged ticket cookie.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-11-06
Source Information Category:
Advisory, Alert
Last Updated:
2010-11-09




Affected Product Tags
cpe:/a:redhat:conga
cpe:/a:redhat:luci:0.22.4 and previous versions
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
X Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

Alternatives




References
BID 44611




CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=626504




CONFIRM http://git.fedorahosted.org/git/?p=luci.git;a=commit;h=9e0bbf0c5faa198379d945474f7d55da5031cacf




FEDORA FEDORA-2010-16601




FEDORA FEDORA-2010-16617




SECUNIA 42123




SECUNIA 42113




VUPEN ADV-2010-2873




Vulnerability Type Authentication Issues (CWE-287)




XF luci-whoini-weak-security(62980)





Copyright © 2010 JPCERT/CC All Rights Reserved.