Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://java.net/jira/browse/JAVASERVERFACES-2436", "name": "http://java.net/jira/browse/JAVASERVERFACES-2436", "tags": ["Exploit"], "refsource": "CONFIRM"}, {"url": "http://www.openwall.com/lists/oss-security/2012/06/07/3", "name": "[oss-security] 20120606 Re: CVE request: Mojarra allows deployed web applications to read FacesContext from other applications", "tags": [], "refsource": "MLIST"}, {"url": "http://www.openwall.com/lists/oss-security/2012/06/07/2", "name": "[oss-security] 20120606 CVE request: Mojarra allows deployed web applications to read FacesContext from other applications", "tags": [], "refsource": "MLIST"}, {"url": "http://secunia.com/advisories/49284", "name": "49284", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "https://issues.jboss.org/browse/JBPAPP-9197", "name": "https://issues.jboss.org/browse/JBPAPP-9197", "tags": [], "refsource": "MISC"}, {"url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html", "name": "RHSA-2012:1592", "tags": [], "refsource": "REDHAT"}, {"url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html", "name": "RHSA-2012:1591", "tags": [], "refsource": "REDHAT"}, {"url": "http://secunia.com/advisories/51607", "name": "51607", "tags": [], "refsource": "SECUNIA"}, {"url": "http://rhn.redhat.com/errata/RHSA-2012-1594.html", "name": "RHSA-2012:1594", "tags": [], "refsource": "REDHAT"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76179", "name": "mojarra-facescontext-info-disc(76179)", "tags": [], "refsource": "XF"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Oracle Mojarra 2.1.7 does not properly \"clean up\" the FacesContext reference during startup, which allows local users to obtain context information an access resources from another WAR file by calling the FacesContext.getCurrentInstance function."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2012-2672", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "LOW", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2012-06-17T03:41Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:oracle:mojarra:2.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-08-29T01:31Z"}