| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.5 | $0-$5k | 0.00 |
Summary
A vulnerability was found in IBM Domino Web Access up to 229.240 and classified as very critical. This affects an unknown part of the component Domino Web Access. Such manipulation leads to Remote Code Execution. This vulnerability is uniquely identified as CVE-2010-0276. No exploit exists. It is suggested to upgrade the affected component.
Details
A vulnerability, which was classified as very critical, has been found in IBM Domino Web Access up to 229.240 (Groupware Software). Affected by this issue is an unknown code of the component Domino Web Access. The manipulation with an unknown input leads to a remote code execution vulnerability. Impacted is confidentiality, integrity, and availability. CVE summarizes:
IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.241 for Domino 8.0.2 FP3 does not properly handle navigation of the "Try Lotus iNotes anyway" link from the page that reports use of an unsupported browser, which has unspecified impact and attack vectors, aka SPR LSHR7TBMQU.
The weakness was disclosed 01/09/2010 (Website). The advisory is available at securityfocus.com. This vulnerability is handled as CVE-2010-0276 since 01/09/2010. The exploitation is known to be easy. The attack may be launched remotely. No form of authentication is required for exploitation. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 12/17/2017). It is expected to see the exploit prices for this product increasing in the near future.
It is declared as proof-of-concept.
Upgrading to version 229.241 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (55473), SecurityFocus (BID 37675†) and Secunia (SA38026†). The entries VDB-4075 and VDB-51481 are pretty similar. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.ibm.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 8.5
VulDB Base Score: 9.8
VulDB Temp Score: 8.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Domino Web Access 229.241
Timeline
01/07/2010 🔍01/09/2010 🔍
01/09/2010 🔍
01/09/2010 🔍
03/18/2015 🔍
12/17/2017 🔍
Sources
Vendor: ibm.comAdvisory: securityfocus.com⛔
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2010-0276 (🔍)
GCVE (CVE): GCVE-0-2010-0276
GCVE (VulDB): GCVE-100-51482
X-Force: 55473 - IBM Lotus Domino Web Access Try Lotus iNotes anyway unspecified
SecurityFocus: 37675 - IBM Lotus Domino Web Access Multiple Unspecified Security Vulnerabilities
Secunia: 38026
Vupen: ADV-2010-0077
See also: 🔍
Entry
Created: 03/18/2015 15:15Updated: 12/17/2017 10:01
Changes: 03/18/2015 15:15 (53), 12/17/2017 10:01 (6)
Complete: 🔍
Cache ID: 216:41C:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.