Vulnerability Details : CVE-2010-0550
admin.htm in Geo++ GNCASTER 1.4.0.7 and earlier does not properly enforce HTTP Digest Authentication, which allows remote authenticated users to use HTTP Basic Authentication, bypassing intended server policy.
Products affected by CVE-2010-0550
- cpe:2.3:a:geopp:geo\+\+_gncaster:*:*:*:*:*:*:*:*
- cpe:2.3:a:geopp:geo\+\+_gncaster:1.4.0.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2010-0550
0.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 54 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0550
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2010-0550
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0550
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/55976
Geo++ GNCASTER HTTP basic weak security CVE-2010-0550 Vulnerability Report
-
http://www.securityfocus.com/archive/1/509199/100/0/threaded
SecurityFocus
-
http://secunia.com/advisories/38323
Sign inVendor Advisory
-
http://osvdb.org/62013
-
http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication
RedTeam Pentesting GmbH - Geo++(R) GNCASTER: Faulty implementation of HTTP Digest Authentication
Jump to