Vulnerability Description
The HTTP Authentication implementation in Geo++ GNCASTER 1.4.0.7 and earlier uses the same nonce for all authentication, which allows remote attackers to hijack web sessions or bypass authentication via a replay attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Geopp | Geo\+\+ Gncaster | <= 1.4.0.7 |
Related Weaknesses (CWE)
References
- http://osvdb.org/62014
- http://secunia.com/advisories/38323Vendor Advisory
- http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-fa
- http://www.securityfocus.com/archive/1/509199/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55977
- http://osvdb.org/62014
- http://secunia.com/advisories/38323Vendor Advisory
- http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-fa
- http://www.securityfocus.com/archive/1/509199/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55977
FAQ
What is CVE-2010-0554?
CVE-2010-0554 is a vulnerability with a CVSS score of 7.5 (HIGH). The HTTP Authentication implementation in Geo++ GNCASTER 1.4.0.7 and earlier uses the same nonce for all authentication, which allows remote attackers to hijack web sessions or bypass authentication v...
How severe is CVE-2010-0554?
CVE-2010-0554 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-0554?
Check the references section above for vendor advisories and patch information. Affected products include: Geopp Geo\+\+ Gncaster.