Vulnerability Description
WebYaST in yast2-webclient in SUSE Linux Enterprise (SLE) 11 on the WebYaST appliance uses a fixed secret key that is embedded in the appliance's image, which allows remote attackers to spoof session cookies by leveraging knowledge of this key.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Suse Linux | 11 |
| Novell | Webyast Appliance | All versions |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://support.novell.com/security/cve/CVE-2010-1507.html
- http://www.securityfocus.com/bid/42128
- https://bugzilla.novell.com/show_bug.cgi?id=591345
- https://bugzilla.novell.com/show_bug.cgi?id=598834
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://support.novell.com/security/cve/CVE-2010-1507.html
- http://www.securityfocus.com/bid/42128
- https://bugzilla.novell.com/show_bug.cgi?id=591345
- https://bugzilla.novell.com/show_bug.cgi?id=598834
FAQ
What is CVE-2010-1507?
CVE-2010-1507 is a vulnerability with a CVSS score of 5.0 (MEDIUM). WebYaST in yast2-webclient in SUSE Linux Enterprise (SLE) 11 on the WebYaST appliance uses a fixed secret key that is embedded in the appliance's image, which allows remote attackers to spoof session ...
How severe is CVE-2010-1507?
CVE-2010-1507 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1507?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Suse Linux, Novell Webyast Appliance.