fkie_cve-2010-4803
Vulnerability from fkie_nvd
Published
2011-05-03 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*", "matchCriteriaId": "25683375-5B17-469D-AB89-A1A7E165948C", "versionEndIncluding": "0.999926", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "083A2DA9-38BB-4AF8-9FF0-41101E830A0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C2C11EC7-D91E-4F65-9C8A-801C724EDBBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "BC33620B-2B78-4221-8067-15E8BC56865A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "69AC00B5-717B-4F7F-AD25-9754BEFD7221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "F2E2469A-BE25-4D18-8E7D-F709DCB86FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "02BB8742-9D5C-4831-BD2F-A24505B8E4C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "82CA1476-123D-44D5-A1E8-D9C58F6D9949", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "479781F2-9614-4552-AE39-12AC41ABB3AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "78D1279D-333D-4338-B4ED-07BB1900FB0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D21184D-8823-4162-961D-8A7856557786", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "538FC292-B6BF-4551-AE44-259E0B61B680", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "574F7A7C-3986-401D-A58F-6C8F7D922002", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "BDACD094-8117-460E-B7D1-E63EC00B97A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*", "matchCriteriaId": "6965DAA1-FDD8-484B-873A-F6D13227FAD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*", "matchCriteriaId": "9865E142-BB29-4718-BD85-F40E185BF31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*", "matchCriteriaId": "9F667C15-3C89-49CD-800D-303A2677FC36", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*", "matchCriteriaId": "8B301544-A38F-417C-BB94-E7711F8ED7C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*", "matchCriteriaId": "ADEBDEB2-3070-4633-A934-DDF49CBD10C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*", "matchCriteriaId": "5875A25D-CC0E-43CF-B617-CEA99C65A52A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*", "matchCriteriaId": "D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*", "matchCriteriaId": "EE5F9699-7B1B-4356-B0EB-C942888AFEE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*", "matchCriteriaId": "A041B8EB-AD9E-452B-9A2E-22DBCD5CB091", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*", "matchCriteriaId": "4BE7A136-3975-400A-AB77-4BCD4669553A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*", "matchCriteriaId": "FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*", "matchCriteriaId": "26803A52-EAEC-4CD6-BB89-F1EF40B3021F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*", "matchCriteriaId": "B7BC4454-3168-420B-9136-21FD18571526", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*", "matchCriteriaId": "A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*", "matchCriteriaId": "B0376F10-8493-498D-9B5D-76AFE0F4417A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*", "matchCriteriaId": "69293BBF-7788-4462-AA6F-9D3A084D1B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*", "matchCriteriaId": "31F30FA3-69EC-45B3-8AF5-852DB73756A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*", "matchCriteriaId": "B88557E4-C793-4F6A-A3AE-07799B212ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*", "matchCriteriaId": "8F88C231-60FE-42F3-87E9-23E88ADC7650", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*", "matchCriteriaId": "BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*", "matchCriteriaId": "B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991246:*:*:*:*:*:*:*", "matchCriteriaId": "A886B4DC-30E9-4C41-A79A-96F309F343F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991250:*:*:*:*:*:*:*", "matchCriteriaId": "C28AEC3C-20F0-4BFB-B7B6-30336C631400", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991251:*:*:*:*:*:*:*", "matchCriteriaId": "7D0521BF-A66D-4663-83C6-49E650454ED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999901:*:*:*:*:*:*:*", "matchCriteriaId": "2C95BB3D-774C-4C71-9A3A-15938BA5CF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999902:*:*:*:*:*:*:*", "matchCriteriaId": "B583B413-4B8E-4FA3-9CD1-A650CEAB9449", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999903:*:*:*:*:*:*:*", "matchCriteriaId": "CDC7A6F1-BD38-4119-B5A7-56A50EC6C9C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999904:*:*:*:*:*:*:*", "matchCriteriaId": "2DEFF843-57F4-4553-ABD3-7269A32A6DE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999905:*:*:*:*:*:*:*", "matchCriteriaId": "E8A7C4E6-5E3E-43CB-8F54-4AA5563EA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999906:*:*:*:*:*:*:*", "matchCriteriaId": "C6CB9879-D8B4-45CA-BF63-D4681C403818", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999907:*:*:*:*:*:*:*", "matchCriteriaId": "66EE203A-CFB1-4317-879D-E6A44F063F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999908:*:*:*:*:*:*:*", "matchCriteriaId": "F7978FDA-7622-4041-BE9E-28F99A1FB16E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999909:*:*:*:*:*:*:*", "matchCriteriaId": "B0975B5B-5409-42F5-A50F-644A80F3E5F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999910:*:*:*:*:*:*:*", "matchCriteriaId": "69AB9069-49F9-43B5-9F0F-04BBB145FD7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999911:*:*:*:*:*:*:*", "matchCriteriaId": "77CA7A3A-254D-4154-8AFB-FA7BC4EB286A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999912:*:*:*:*:*:*:*", "matchCriteriaId": "0FA8D9CE-BD9E-4BD2-B38C-909CCE0D3842", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999913:*:*:*:*:*:*:*", "matchCriteriaId": "6DABFC81-F44C-46AB-B9CD-D35624F5071A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999914:*:*:*:*:*:*:*", "matchCriteriaId": "DE8BDB83-641B-4858-B00A-EEFC9F583050", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999920:*:*:*:*:*:*:*", "matchCriteriaId": "D010713B-DE3E-4E76-8299-FF50D19ADA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999921:*:*:*:*:*:*:*", "matchCriteriaId": "92B83ECE-5D7C-417D-9957-976ECE8E2308", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999922:*:*:*:*:*:*:*", "matchCriteriaId": "59E2E6AF-11DD-4C51-A84F-129D160ACAFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999923:*:*:*:*:*:*:*", "matchCriteriaId": "E9590109-8DFC-4E78-B678-8456A0621C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999924:*:*:*:*:*:*:*", "matchCriteriaId": "03FD1031-0C3D-45F1-BFD9-823C6D4B69F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999925:*:*:*:*:*:*:*", "matchCriteriaId": "44059C1E-CDC6-4B75-92CC-CD45C5063F9D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors." }, { "lang": "es", "value": "Mojolicious antes de v0.999927 no aplica adecuadamente las sumas de comprobaci\u00f3n HMAC - MD5, lo cual tiene un impacto sin especificar y vectores de ataque remotos" } ], "id": "CVE-2010-4803", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-05-03T00:55:00.997", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952" }, { "source": "cve@mitre.org", "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2239" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…