Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2023-5236
Vulnerability from cvelistv5
Published
2023-12-18 13:43
Modified
2024-11-23 01:11
Severity ?
EPSS score ?
Summary
A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Red Hat | Red Hat Data Grid 8.4.4 |
cpe:/a:redhat:jboss_data_grid:8 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:52:08.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:5396", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-5236" }, { "name": "RHBZ#2240999", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240999" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240125-0004/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5236", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T15:51:30.945664Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-27T15:51:36.364Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html", "cpes": [ "cpe:/a:redhat:jboss_data_grid:8" ], "defaultStatus": "unaffected", "product": "Red Hat Data Grid 8.4.4", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:jboss_data_grid:8" ], "defaultStatus": "affected", "packageName": "infinispan-server", "product": "Red Hat Data Grid 8", "vendor": "Red Hat" } ], "datePublic": "2023-09-27T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Low" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1047", "description": "Modules with Circular Dependencies", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-23T01:11:26.492Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:5396", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-5236" }, { "name": "RHBZ#2240999", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240999" } ], "timeline": [ { "lang": "en", "time": "2023-03-23T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-09-27T00:00:00+00:00", "value": "Made public." } ], "title": "Infinispan: circular reference on marshalling leads to dos", "x_redhatCweChain": "CWE-1047: Modules with Circular Dependencies" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-5236", "datePublished": "2023-12-18T13:43:08.445Z", "dateReserved": "2023-09-27T16:33:11.279Z", "dateUpdated": "2024-11-23T01:11:26.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-5236\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-12-18T14:15:10.917\",\"lastModified\":\"2024-11-21T08:41:20.950\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en Infinispan, que no detecta referencias de objetos circulares al desarmar. Un atacante autenticado con permisos suficientes podr\u00eda insertar un objeto construido con fines malintencionados en la memoria cach\u00e9 y utilizarlo para provocar errores de falta de memoria y lograr una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.7,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1047\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:data_grid:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.4.4\",\"matchCriteriaId\":\"C6401304-B700-4F69-9385-66B7398C55D8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*\",\"matchCriteriaId\":\"2BF03A52-4068-47EA-8846-1E5FB708CE1A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:infinispan:infinispan:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6718434-9048-42D0-8E70-40531CA83A16\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5396\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-5236\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2240999\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5396\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-5236\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2240999\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240125-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
wid-sec-w-2023-2518
Vulnerability from csaf_certbund
Published
2023-09-28 22:00
Modified
2024-03-06 23:00
Summary
Red Hat JBoss Data Grid: Mehre Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat JBoss Data Grid ist eine verteilte In-Memory-Datenbank für den schnellen Zugriff auf große Datenvolumen und Skalierbarkeit.
Angriff
Ein entfernter anonymer Angreifer kann eine Schwachstelle in Red Hat JBoss Data Grid ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat JBoss Data Grid ist eine verteilte In-Memory-Datenbank f\u00fcr den schnellen Zugriff auf gro\u00dfe Datenvolumen und Skalierbarkeit.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer Angreifer kann eine Schwachstelle in Red Hat JBoss Data Grid ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2518 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2518.json" }, { "category": "self", "summary": "WID-SEC-2023-2518 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2518" }, { "category": "external", "summary": "Red Hat Security Update vom 2023-09-28", "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "category": "external", "summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-35116", "url": "https://github.com/FasterXML/jackson-databind/issues/3972" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5484 vom 2023-10-05", "url": "https://access.redhat.com/errata/RHSA-2023:5484" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5488 vom 2023-10-05", "url": "https://access.redhat.com/errata/RHSA-2023:5488" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5486 vom 2023-10-06", "url": "https://access.redhat.com/errata/RHSA-2023:5486" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5485 vom 2023-10-06", "url": "https://access.redhat.com/errata/RHSA-2023:5485" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5946 vom 2023-10-20", "url": "https://access.redhat.com/errata/RHSA-2023:5946" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7641 vom 2023-12-05", "url": "https://access.redhat.com/errata/RHSA-2023:7641" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7637 vom 2023-12-05", "url": "https://access.redhat.com/errata/RHSA-2023:7637" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7638 vom 2023-12-05", "url": "https://access.redhat.com/errata/RHSA-2023:7638" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7639 vom 2023-12-05", "url": "https://access.redhat.com/errata/RHSA-2023:7639" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7653 vom 2023-12-06", "url": "https://access.redhat.com/errata/RHSA-2023:7653" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7705 vom 2023-12-08", "url": "https://access.redhat.com/errata/RHSA-2023:7705" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7697 vom 2023-12-07", "url": "https://access.redhat.com/errata/RHSA-2023:7697" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0148 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0148" }, { "category": "external", "summary": "IBM Security Bulletin 7108821 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108821" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20240125-0004 vom 2024-01-25", "url": "https://security.netapp.com/advisory/ntap-20240125-0004/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1192 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1192" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1193 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1193" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1194 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1194" } ], "source_lang": "en-US", "title": "Red Hat JBoss Data Grid: Mehre Schwachstellen", "tracking": { "current_release_date": "2024-03-06T23:00:00.000+00:00", "generator": { "date": "2024-03-07T09:36:49.682+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2518", "initial_release_date": "2023-09-28T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-28T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-10-05T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-04T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-05T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-07T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-10T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2024-03-06T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "10" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "10.0.0.0 - 10.0.6.1", "product": { "name": "IBM Security Verify Access 10.0.0.0 - 10.0.6.1", "product_id": "T031895", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T016960", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Camel Extensions for Quarkus 1", "product": { "name": "Red Hat Integration Camel Extensions for Quarkus 1", "product_id": "T026453", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:camel_extensions_for_quarkus_1" } } }, { "category": "product_version", "name": "Service Registry 1", "product": { "name": "Red Hat Integration Service Registry 1", "product_id": "T031465", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:service_registry_1" } } }, { "category": "product_version", "name": "Camel K 1", "product": { "name": "Red Hat Integration Camel K 1", "product_id": "T031972", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:camel_k_1" } } } ], "category": "product_name", "name": "Integration" }, { "branches": [ { "category": "product_version", "name": "Clients 3", "product": { "name": "Red Hat JBoss A-MQ Clients 3", "product_id": "T031509", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:clients_3" } } } ], "category": "product_name", "name": "JBoss A-MQ" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 8.4.4", "product": { "name": "Red Hat JBoss Data Grid \u003c 8.4.4", "product_id": "T030159", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:8.4.4" } } } ], "category": "product_name", "name": "JBoss Data Grid" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.1", "product": { "name": "Red Hat JBoss Enterprise Application Platform \u003c 8.0.1", "product_id": "T033272", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0.1" } } } ], "category": "product_name", "name": "JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5236", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-5236" }, { "cve": "CVE-2023-3629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-3629" }, { "cve": "CVE-2023-3628", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-3628" }, { "cve": "CVE-2023-35887", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-35887" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2022-45047", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2022-45047" } ] }
WID-SEC-W-2023-2518
Vulnerability from csaf_certbund
Published
2023-09-28 22:00
Modified
2024-03-06 23:00
Summary
Red Hat JBoss Data Grid: Mehre Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat JBoss Data Grid ist eine verteilte In-Memory-Datenbank für den schnellen Zugriff auf große Datenvolumen und Skalierbarkeit.
Angriff
Ein entfernter anonymer Angreifer kann eine Schwachstelle in Red Hat JBoss Data Grid ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat JBoss Data Grid ist eine verteilte In-Memory-Datenbank f\u00fcr den schnellen Zugriff auf gro\u00dfe Datenvolumen und Skalierbarkeit.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer Angreifer kann eine Schwachstelle in Red Hat JBoss Data Grid ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2518 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2518.json" }, { "category": "self", "summary": "WID-SEC-2023-2518 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2518" }, { "category": "external", "summary": "Red Hat Security Update vom 2023-09-28", "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "category": "external", "summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-35116", "url": "https://github.com/FasterXML/jackson-databind/issues/3972" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5484 vom 2023-10-05", "url": "https://access.redhat.com/errata/RHSA-2023:5484" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5488 vom 2023-10-05", "url": "https://access.redhat.com/errata/RHSA-2023:5488" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5486 vom 2023-10-06", "url": "https://access.redhat.com/errata/RHSA-2023:5486" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5485 vom 2023-10-06", "url": "https://access.redhat.com/errata/RHSA-2023:5485" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5946 vom 2023-10-20", "url": "https://access.redhat.com/errata/RHSA-2023:5946" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7641 vom 2023-12-05", "url": "https://access.redhat.com/errata/RHSA-2023:7641" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7637 vom 2023-12-05", "url": "https://access.redhat.com/errata/RHSA-2023:7637" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7638 vom 2023-12-05", "url": "https://access.redhat.com/errata/RHSA-2023:7638" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7639 vom 2023-12-05", "url": "https://access.redhat.com/errata/RHSA-2023:7639" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7653 vom 2023-12-06", "url": "https://access.redhat.com/errata/RHSA-2023:7653" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7705 vom 2023-12-08", "url": "https://access.redhat.com/errata/RHSA-2023:7705" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7697 vom 2023-12-07", "url": "https://access.redhat.com/errata/RHSA-2023:7697" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0148 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0148" }, { "category": "external", "summary": "IBM Security Bulletin 7108821 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108821" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20240125-0004 vom 2024-01-25", "url": "https://security.netapp.com/advisory/ntap-20240125-0004/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1192 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1192" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1193 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1193" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1194 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1194" } ], "source_lang": "en-US", "title": "Red Hat JBoss Data Grid: Mehre Schwachstellen", "tracking": { "current_release_date": "2024-03-06T23:00:00.000+00:00", "generator": { "date": "2024-03-07T09:36:49.682+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2518", "initial_release_date": "2023-09-28T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-28T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-10-05T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-04T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-05T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-07T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-10T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2024-03-06T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "10" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "10.0.0.0 - 10.0.6.1", "product": { "name": "IBM Security Verify Access 10.0.0.0 - 10.0.6.1", "product_id": "T031895", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T016960", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Camel Extensions for Quarkus 1", "product": { "name": "Red Hat Integration Camel Extensions for Quarkus 1", "product_id": "T026453", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:camel_extensions_for_quarkus_1" } } }, { "category": "product_version", "name": "Service Registry 1", "product": { "name": "Red Hat Integration Service Registry 1", "product_id": "T031465", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:service_registry_1" } } }, { "category": "product_version", "name": "Camel K 1", "product": { "name": "Red Hat Integration Camel K 1", "product_id": "T031972", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:camel_k_1" } } } ], "category": "product_name", "name": "Integration" }, { "branches": [ { "category": "product_version", "name": "Clients 3", "product": { "name": "Red Hat JBoss A-MQ Clients 3", "product_id": "T031509", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:clients_3" } } } ], "category": "product_name", "name": "JBoss A-MQ" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 8.4.4", "product": { "name": "Red Hat JBoss Data Grid \u003c 8.4.4", "product_id": "T030159", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:8.4.4" } } } ], "category": "product_name", "name": "JBoss Data Grid" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.1", "product": { "name": "Red Hat JBoss Enterprise Application Platform \u003c 8.0.1", "product_id": "T033272", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0.1" } } } ], "category": "product_name", "name": "JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5236", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-5236" }, { "cve": "CVE-2023-3629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-3629" }, { "cve": "CVE-2023-3628", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-3628" }, { "cve": "CVE-2023-35887", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-35887" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2022-45047", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat JBoss Data Grid. Diese Fehler bestehen in den Komponenten jackson-databind, netty, infinispan und apache-mina-sshd. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031465", "T031895", "T031972", "67646", "T033272", "T016960", "T031509", "T026453" ] }, "release_date": "2023-09-28T22:00:00Z", "title": "CVE-2022-45047" } ] }
rhsa-2023_5396
Vulnerability from csaf_redhat
Published
2023-09-28 11:55
Modified
2024-12-17 04:51
Summary
Red Hat Security Advisory: Red Hat Data Grid 8.4.4 security update
Notes
Topic
An update for Red Hat Data Grid 8 is now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution. It increases application response times and allows for dramatically improving performance while providing availability, reliability, and elastic scale.
Data Grid 8.4.4 replaces Data Grid 8.4.3 and includes bug fixes and enhancements. Find out more about Data Grid 8.4.4 in the Release Notes[3].
Security Fix(es):
* infispan: REST bulk ops don't check permissions (CVE-2023-3628)
* infinispan: Non-admins should not be able to get cache config via REST API (CVE-2023-3629)
* netty: SniHandler 16MB allocation leads to OOM (CVE-2023-34462)
* jackson-databind: denial of service via cylic dependencies (CVE-2023-35116)
* apache-mina: information exposure in SFTP server implementations (CVE-2023-35887)
* infinispan: circular reference on marshalling leads to DoS (CVE-2023-5236)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat Data Grid 8 is now available.\n \nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution. It increases application response times and allows for dramatically improving performance while providing availability, reliability, and elastic scale.\n \nData Grid 8.4.4 replaces Data Grid 8.4.3 and includes bug fixes and enhancements. Find out more about Data Grid 8.4.4 in the Release Notes[3].\n\nSecurity Fix(es):\n\n* infispan: REST bulk ops don\u0027t check permissions (CVE-2023-3628)\n\n* infinispan: Non-admins should not be able to get cache config via REST API (CVE-2023-3629)\n\n* netty: SniHandler 16MB allocation leads to OOM (CVE-2023-34462)\n\n* jackson-databind: denial of service via cylic dependencies (CVE-2023-35116)\n\n* apache-mina: information exposure in SFTP server implementations (CVE-2023-35887)\n\n* infinispan: circular reference on marshalling leads to DoS (CVE-2023-5236)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:5396", "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/softwareDetail.html?softwareId=70381\u0026product=data.grid\u0026version=8.4\u0026downloadType=patches", "url": "https://access.redhat.com/jbossnetwork/restricted/softwareDetail.html?softwareId=70381\u0026product=data.grid\u0026version=8.4\u0026downloadType=patches" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/8.4/html-single/red_hat_data_grid_8.4_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/8.4/html-single/red_hat_data_grid_8.4_release_notes/index" }, { "category": "external", "summary": "2215214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215214" }, { "category": "external", "summary": "2216888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888" }, { "category": "external", "summary": "2217924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217924" }, { "category": "external", "summary": "2217926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217926" }, { "category": "external", "summary": "2240036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240036" }, { "category": "external", "summary": "2240999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240999" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5396.json" } ], "title": "Red Hat Security Advisory: Red Hat Data Grid 8.4.4 security update", "tracking": { "current_release_date": "2024-12-17T04:51:18+00:00", "generator": { "date": "2024-12-17T04:51:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:5396", "initial_release_date": "2023-09-28T11:55:36+00:00", "revision_history": [ { "date": "2023-09-28T11:55:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-09-28T11:55:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T04:51:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Data Grid 8.4.4", "product": { "name": "Red Hat Data Grid 8.4.4", "product_id": "Red Hat Data Grid 8.4.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:8" } } } ], "category": "product_family", "name": "Red Hat JBoss Data Grid" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-45047", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2145194" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "mina-sshd: Java unsafe deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Impact as High as there\u0027s a mitigation for minimizing the impact which the flaw requires org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to be impacted, which would require an external/public API for an attacker to benefit from it. \n\nRed Hat Fuse 7 and Red Hat JBoss Enterprise Application Platform 7 have a lower rate (moderate) as it\u0027s very unlikely to be exploited since those are for internal usage or use a custom implementation in their case.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 8.4.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45047" }, { "category": "external", "summary": "RHBZ#2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047" }, { "category": "external", "summary": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html", "url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html" } ], "release_date": "2022-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-28T11:55:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Data Grid 8.4.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "category": "workaround", "details": "From the maintainer:\n\nFor Apache MINA SSHD \u003c= 2.9.1, do not use org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to generate and later load your server\u0027s host key. Use separately generated host key files, for instance in OpenSSH format, and load them via a org.apache.sshd.common.keyprovider.FileKeyPairProvider instead. Or use a custom implementation instead of \nSimpleGeneratorHostKeyProvider that uses the OpenSSH format for storing and loading the host key (via classes OpenSSHKeyPairResourceWriter and OpenSSHKeyPairResourceParser).", "product_ids": [ "Red Hat Data Grid 8.4.4" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Data Grid 8.4.4" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mina-sshd: Java unsafe deserialization vulnerability" }, { "cve": "CVE-2023-3628", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "discovery_date": "2023-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2217924" } ], "notes": [ { "category": "description", "text": "A flaw was found in Infinispan\u0027s REST. Bulk read endpoints do not properly evaluate user permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "infispan: REST bulk ops don\u0027t check permissions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 8.4.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3628" }, { "category": "external", "summary": "RHBZ#2217924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3628", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3628" } ], "release_date": "2023-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-28T11:55:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Data Grid 8.4.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5396" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Data Grid 8.4.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "infispan: REST bulk ops don\u0027t check permissions" }, { "cve": "CVE-2023-3629", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "discovery_date": "2023-06-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2217926" } ], "notes": [ { "category": "description", "text": "A flaw was found in Infinispan\u0027s REST, Cache retrieval endpoints do not properly evaluate the necessary admin permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: Non-admins should not be able to get cache config via REST API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 8.4.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3629" }, { "category": "external", "summary": "RHBZ#2217926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217926" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3629" } ], "release_date": "2023-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-28T11:55:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Data Grid 8.4.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5396" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Data Grid 8.4.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "infinispan: Non-admins should not be able to get cache config via REST API" }, { "cve": "CVE-2023-5236", "cwe": { "id": "CWE-1047", "name": "Modules with Circular Dependencies" }, "discovery_date": "2023-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2240999" } ], "notes": [ { "category": "description", "text": "A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: circular reference on marshalling leads to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 8.4.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5236" }, { "category": "external", "summary": "RHBZ#2240999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240999" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5236", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5236" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5236", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5236" } ], "release_date": "2023-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-28T11:55:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Data Grid 8.4.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5396" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Data Grid 8.4.4" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "infinispan: circular reference on marshalling leads to DoS" }, { "cve": "CVE-2023-34462", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2216888" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty\u0027s SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: SniHandler 16MB allocation leads to OOM", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 8.4.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-34462" }, { "category": "external", "summary": "RHBZ#2216888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-34462", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462" } ], "release_date": "2023-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-28T11:55:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Data Grid 8.4.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "category": "workaround", "details": "Configuration of SniHandler with an idle timeout will mitigate this issue.", "product_ids": [ "Red Hat Data Grid 8.4.4" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Data Grid 8.4.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: SniHandler 16MB allocation leads to OOM" }, { "cve": "CVE-2023-35116", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2215214" } ], "notes": [ { "category": "description", "text": "jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor\u0027s perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: denial of service via cylic dependencies", "title": "Vulnerability summary" }, { "category": "other", "text": "This CVE is disputed by the component developers and is under reconsideration by NIST. As such, it should be excluded from scanning utilities or other compliance systems until the dispute is finalized.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 8.4.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-35116" }, { "category": "external", "summary": "RHBZ#2215214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-35116", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35116", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35116" } ], "release_date": "2023-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-28T11:55:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Data Grid 8.4.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "category": "workaround", "details": "jackson-databind should not be used to deserialize untrusted inputs. User inputs should be validated and sanitized before processing.", "product_ids": [ "Red Hat Data Grid 8.4.4" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Data Grid 8.4.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: denial of service via cylic dependencies" }, { "cve": "CVE-2023-35887", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2023-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2240036" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Mina SSHD that could be exploited on certain SFTP servers implemented using the Apache Mina RootedFileSystem. This issue could permit authenticated users to view information outside of their permissions scope.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-mina-sshd: information exposure in SFTP server implementations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 8.4.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-35887" }, { "category": "external", "summary": "RHBZ#2240036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240036" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-35887", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887" } ], "release_date": "2023-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-28T11:55:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Data Grid 8.4.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5396" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Data Grid 8.4.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-mina-sshd: information exposure in SFTP server implementations" } ] }
gsd-2023-5236
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-5236", "id": "GSD-2023-5236" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-5236" ], "details": "A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service.", "id": "GSD-2023-5236", "modified": "2023-12-13T01:20:51.169434Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2023-5236", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Red Hat Data Grid 8.4.4", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unaffected" } } ] } }, { "product_name": "Red Hat Data Grid 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } } ] } } ] }, "vendor_name": "Red Hat" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service." } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-1047", "lang": "eng", "value": "Modules with Circular Dependencies" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/errata/RHSA-2023:5396", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "name": "https://access.redhat.com/security/cve/CVE-2023-5236", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2023-5236" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2240999", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240999" }, { "name": "https://security.netapp.com/advisory/ntap-20240125-0004/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20240125-0004/" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:data_grid:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6401304-B700-4F69-9385-66B7398C55D8", "versionEndExcluding": "8.4.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*", "matchCriteriaId": "2BF03A52-4068-47EA-8846-1E5FB708CE1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:infinispan:infinispan:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6718434-9048-42D0-8E70-40531CA83A16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service." }, { "lang": "es", "value": "Se encontr\u00f3 una falla en Infinispan, que no detecta referencias de objetos circulares al desarmar. Un atacante autenticado con permisos suficientes podr\u00eda insertar un objeto construido con fines malintencionados en la memoria cach\u00e9 y utilizarlo para provocar errores de falta de memoria y lograr una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-5236", "lastModified": "2024-01-25T14:15:26.617", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" } ] }, "published": "2023-12-18T14:15:10.917", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-5236" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240999" }, { "source": "secalert@redhat.com", "url": "https://security.netapp.com/advisory/ntap-20240125-0004/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-1047" } ], "source": "secalert@redhat.com", "type": "Secondary" } ] } } } }
ghsa-488m-w9fp-5mm2
Vulnerability from github
Published
2023-12-28 21:30
Modified
2024-11-18 16:26
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
7.1 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
7.1 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Summary
Infinispan circular object references causes out of memory errors
Details
A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.infinispan.protostream:protostream" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "4.6.2.Final" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-5236" ], "database_specific": { "cwe_ids": [ "CWE-1047" ], "github_reviewed": true, "github_reviewed_at": "2024-09-16T21:37:34Z", "nvd_published_at": "2023-12-18T14:15:10Z", "severity": "HIGH" }, "details": "A flaw was found in Infinispan, which does not detect circular object references when unmarshalling. An authenticated attacker with sufficient permissions could insert a maliciously constructed object into the cache and use it to cause out of memory errors and achieve a denial of service.", "id": "GHSA-488m-w9fp-5mm2", "modified": "2024-11-18T16:26:34Z", "published": "2023-12-28T21:30:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5236" }, { "type": "WEB", "url": "https://github.com/infinispan/protostream/commit/4501b6b307a6bab545346f66238f8be7e42f83eb" }, { "type": "WEB", "url": "https://github.com/infinispan/protostream/commit/4ef66958f2c4890ae1c6a7acd629d27bd88aa4cb" }, { "type": "WEB", "url": "https://github.com/infinispan/protostream/commit/50320b5987dc87bc04b616b87e8cf93472ee19c1" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2023-5236" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240999" }, { "type": "PACKAGE", "url": "https://github.com/infinispan/infinispan" }, { "type": "WEB", "url": "https://issues.redhat.com/browse/IPROTO-262" }, { "type": "WEB", "url": "https://issues.redhat.com/browse/IPROTO-263" }, { "type": "WEB", "url": "https://issues.redhat.com/browse/ISPN-14534" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240125-0004" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Infinispan circular object references causes out of memory errors" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.