rhsa-2017_3456
Vulnerability from csaf_redhat
Published
2017-12-13 17:31
Modified
2024-11-22 11:40
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.
This release of Red Hat JBoss Enterprise Application Platform 7.1.0 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* A Denial of Service can be caused when a long request is sent to EAP 7. (CVE-2016-7046)
* World executable permission on bin/jboss-cli after installation. Any users of the system could cause harm, or shutdown the running instance. (CVE-2016-7066)
* A deserialization vulnerability via readValue method of ObjectMapper which allows arbitrary code execution. (CVE-2017-7525)
* JMSObjectMessage deserializes potentially malicious objects allowing Remote Code Execution. (CVE-2016-4978)
* Undertow is vulnerable to the injection of arbitrary HTTP headers, and also response splitting. (CVE-2016-4993)
* The domain controller will not propagate its administrative RBAC configuration to some slaves leading to escalate their privileges. (CVE-2016-5406)
* Internal IP address disclosed on redirect when request header Host field is not set. (CVE-2016-6311)
* Potential EAP resource starvation DOS attack via GET requests for server log files. (CVE-2016-8627)
* Inefficient Header Cache could cause denial of service. (CVE-2016-9589)
* The log file viewer allows arbitrary file read to authenticated user via path traversal. (CVE-2017-2595)
* HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests. (CVE-2017-2666)
* Websocket non clean close can cause IO thread to get stuck in a loop. (CVE-2017-2670)
* Privilege escalation with security manager's reflective permissions when granted to Hibernate Validator. (CVE-2017-7536)
* Potential http request smuggling as Undertow parses the http headers with unusual whitespaces. (CVE-2017-7559)
* Properties based files of the management and the application realm are world readable allowing access to users and roles information to all the users logged in to the system. (CVE-2017-12167)
* RBAC configuration allows users with a Monitor role to view the sensitive information. (CVE-2016-7061)
* Improper whitespace parsing leading to potential HTTP request smuggling. (CVE-2017-12165)
Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525; Calum Hutton (NCC Group) and Mikhail Egorov (Odin) for reporting CVE-2016-4993; Luca Bueti for reporting CVE-2016-6311; Gabriel Lavoie (Halogen Software) for reporting CVE-2016-9589; and Gregory Ramsperger and Ryan Moak for reporting CVE-2017-2670. The CVE-2016-5406 issue was discovered by Tomaz Cerar (Red Hat); the CVE-2016-8627 issue was discovered by Darran Lofthouse (Red Hat) and Brian Stansberry (Red Hat); the CVE-2017-2666 issue was discovered by Radim Hatlapatka (Red Hat); the CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat); the CVE-2017-7559 and CVE-2017-12165 issues were discovered by Stuart Douglas (Red Hat); and the CVE-2017-12167 issue was discovered by Brian Stansberry (Red Hat) and Jeremy Choi (Red Hat). Upstream acknowledges WildFly as the original reporter of CVE-2016-6311.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.1.0 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* A Denial of Service can be caused when a long request is sent to EAP 7. (CVE-2016-7046)\n\n* World executable permission on bin/jboss-cli after installation. Any users of the system could cause harm, or shutdown the running instance. (CVE-2016-7066)\n\n* A deserialization vulnerability via readValue method of ObjectMapper which allows arbitrary code execution. (CVE-2017-7525)\n\n* JMSObjectMessage deserializes potentially malicious objects allowing Remote Code Execution. (CVE-2016-4978)\n\n* Undertow is vulnerable to the injection of arbitrary HTTP headers, and also response splitting. (CVE-2016-4993)\n\n* The domain controller will not propagate its administrative RBAC configuration to some slaves leading to escalate their privileges. (CVE-2016-5406)\n\n* Internal IP address disclosed on redirect when request header Host field is not set. (CVE-2016-6311)\n\n* Potential EAP resource starvation DOS attack via GET requests for server log files. (CVE-2016-8627)\n\n* Inefficient Header Cache could cause denial of service. (CVE-2016-9589)\n\n* The log file viewer allows arbitrary file read to authenticated user via path traversal. (CVE-2017-2595)\n\n* HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests. (CVE-2017-2666)\n\n* Websocket non clean close can cause IO thread to get stuck in a loop. (CVE-2017-2670)\n\n* Privilege escalation with security manager\u0027s reflective permissions when granted to Hibernate Validator. (CVE-2017-7536)\n\n* Potential http request smuggling as Undertow parses the http headers with unusual whitespaces. (CVE-2017-7559)\n\n* Properties based files of the management and the application realm are world readable allowing access to users and roles information to all the users logged in to the system. (CVE-2017-12167)\n\n* RBAC configuration allows users with a Monitor role to view the sensitive information. (CVE-2016-7061)\n\n* Improper whitespace parsing leading to potential HTTP request smuggling. (CVE-2017-12165)\n\nRed Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525; Calum Hutton (NCC Group) and Mikhail Egorov (Odin) for reporting CVE-2016-4993; Luca Bueti for reporting CVE-2016-6311; Gabriel Lavoie (Halogen Software) for reporting CVE-2016-9589; and Gregory Ramsperger and Ryan Moak for reporting CVE-2017-2670. The CVE-2016-5406 issue was discovered by Tomaz Cerar (Red Hat); the CVE-2016-8627 issue was discovered by Darran Lofthouse (Red Hat) and Brian Stansberry (Red Hat); the CVE-2017-2666 issue was discovered by Radim Hatlapatka (Red Hat); the CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat); the CVE-2017-7559 and CVE-2017-12165 issues were discovered by Stuart Douglas (Red Hat); and the CVE-2017-12167 issue was discovered by Brian Stansberry (Red Hat) and Jeremy Choi (Red Hat). Upstream acknowledges WildFly as the original reporter of CVE-2016-6311.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3456", "url": "https://access.redhat.com/errata/RHSA-2017:3456" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=appplatform\u0026version=7.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=appplatform\u0026version=7.1" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/version-7.1", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/version-7.1" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/" }, { "category": "external", "summary": "1344321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344321" }, { "category": "external", "summary": "1359014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359014" }, { "category": "external", "summary": "1362735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362735" }, { "category": "external", "summary": "1376646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376646" }, { "category": "external", "summary": "1379207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379207" }, { "category": "external", "summary": "1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "1401661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401661" }, { "category": "external", "summary": "1404782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404782" }, { "category": "external", "summary": "1413028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413028" }, { "category": "external", "summary": "1436163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436163" }, { "category": "external", "summary": "1438885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438885" }, { "category": "external", "summary": "1462702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462702" }, { "category": "external", "summary": "1465573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465573" }, { "category": "external", "summary": "1481665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481665" }, { "category": "external", "summary": "1490301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490301" }, { "category": "external", "summary": "1491612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491612" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3456.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update", "tracking": { "current_release_date": "2024-11-22T11:40:46+00:00", "generator": { "date": "2024-11-22T11:40:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:3456", "initial_release_date": "2017-12-13T17:31:03+00:00", "revision_history": [ { "date": "2017-12-13T17:31:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-12-13T17:31:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:40:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7", "product": { "name": "Red Hat JBoss EAP 7", "product_id": "Red Hat JBoss EAP 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4978", "discovery_date": "2016-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1379207" } ], "notes": [ { "category": "description", "text": "It was found that use of a JMS ObjectMessage does not safely handle user supplied data when deserializing objects. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.", "title": "Vulnerability description" }, { "category": "summary", "text": "Artemis: Deserialization of untrusted input vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4978" }, { "category": "external", "summary": "RHBZ#1379207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4978", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4978" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4978", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4978" } ], "release_date": "2016-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Artemis: Deserialization of untrusted input vulnerability" }, { "acknowledgments": [ { "names": [ "Calum Hutton" ], "organization": "NCC Group" }, { "names": [ "Mikhail Egorov" ], "organization": "Odin" } ], "cve": "CVE-2016-4993", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2016-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1344321" } ], "notes": [ { "category": "description", "text": "It was reported that EAP 7 Application Server/Undertow web server is vulnerable to the injection of arbitrary HTTP headers, and also response splitting, due to insufficient sanitization and validation of user input before the input is used as part of an HTTP header value.", "title": "Vulnerability description" }, { "category": "summary", "text": "eap: HTTP header injection / response splitting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4993" }, { "category": "external", "summary": "RHBZ#1344321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4993", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4993" } ], "release_date": "2016-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "eap: HTTP header injection / response splitting" }, { "acknowledgments": [ { "names": [ "Tomaz Cerar" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-5406", "discovery_date": "2016-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1359014" } ], "notes": [ { "category": "description", "text": "The domain controller will not propagate its administrative RBAC configuration to some slaves. An attacker could use this to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP7 Privilege escalation when managing domain including earlier version slaves", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5406" }, { "category": "external", "summary": "RHBZ#1359014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5406", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5406" } ], "release_date": "2016-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:P/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EAP7 Privilege escalation when managing domain including earlier version slaves" }, { "acknowledgments": [ { "names": [ "Luca Bueti" ] }, { "names": [ "WildFly" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6311", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1362735" } ], "notes": [ { "category": "description", "text": "It was found that when issuing a GET request which results in a 302 redirect, and when the request header \u0027Host\u0027 field was not set, the response header field \u0027Location\u0027 contains the internal IP address of the server. An attacker could use this disclose information which they are not authorized to access.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP7: Internal IP address disclosed on redirect when request header Host field is not set", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6311" }, { "category": "external", "summary": "RHBZ#1362735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6311", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6311" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6311", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6311" } ], "release_date": "2016-07-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" }, { "category": "workaround", "details": "You can add a filter in the JBoss CLI that sets the host header to the \u0027myvirtualhost.com\u0027 if the host header is not present. eg:\n\n/subsystem=undertow/configuration=filter/expression-filter=hostname:add(expression=\"header(header=Host, value=myvirtualhost.com)\")\n/subsystem=undertow/server=default-server/host=default-host/filter-ref=hostname:add(predicate=\"not exists(%{i,Host})\")", "product_ids": [ "Red Hat JBoss EAP 7" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EAP7: Internal IP address disclosed on redirect when request header Host field is not set" }, { "cve": "CVE-2016-7046", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2016-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1376646" } ], "notes": [ { "category": "description", "text": "It was discovered that a long URL sent to EAP 7 Server operating as a reverse proxy with default buffer sizes causes a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7046" }, { "category": "external", "summary": "RHBZ#1376646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376646" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7046", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7046" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7046", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7046" } ], "release_date": "2016-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS" }, { "cve": "CVE-2016-7061", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1380852" } ], "notes": [ { "category": "description", "text": "It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: Sensitive data can be exposed at the server level in domain mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7061" }, { "category": "external", "summary": "RHBZ#1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7061", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061" } ], "release_date": "2016-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "EAP: Sensitive data can be exposed at the server level in domain mode" }, { "acknowledgments": [ { "names": [ "Jeremy Choi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-7066", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2016-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1401661" } ], "notes": [ { "category": "description", "text": "It was found that the improper default permissions on /tmp/auth directory in EAP 7 can allow any local user to connect to CLI and allow the user to execute any arbitrary operations.", "title": "Vulnerability description" }, { "category": "summary", "text": "admin-cli: Any local users can connect to jboss-cli", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7066" }, { "category": "external", "summary": "RHBZ#1401661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401661" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7066", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7066" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7066", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7066" } ], "release_date": "2017-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "admin-cli: Any local users can connect to jboss-cli" }, { "acknowledgments": [ { "names": [ "Brian Stansberry", "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-8627", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388240" } ], "notes": [ { "category": "description", "text": "An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired.", "title": "Vulnerability description" }, { "category": "summary", "text": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8627" }, { "category": "external", "summary": "RHBZ#1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8627", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627" } ], "release_date": "2017-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files" }, { "acknowledgments": [ { "names": [ "Gabriel Lavoie" ], "organization": "Halogen Software" } ], "cve": "CVE-2016-9589", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1404782" } ], "notes": [ { "category": "description", "text": "It was found that JBoss EAP 7 Header Cache was inefficient. An attacker could use this flaw to cause a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9589" }, { "category": "external", "summary": "RHBZ#1404782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9589", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9589" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9589", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9589" } ], "release_date": "2017-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage" }, { "cve": "CVE-2017-2595", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2017-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1413028" } ], "notes": [ { "category": "description", "text": "It was found that the log file viewer in Red Hat JBoss Enterprise Application 6 and 7 allows arbitrary file read to authenticated user via path traversal.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Arbitrary file read via path traversal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2595" }, { "category": "external", "summary": "RHBZ#1413028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2595", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2595" } ], "release_date": "2017-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Arbitrary file read via path traversal" }, { "acknowledgments": [ { "names": [ "Radim Hatlapatka" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2017-2666", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2017-03-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1436163" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2666" }, { "category": "external", "summary": "RHBZ#1436163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2666", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2666" } ], "release_date": "2017-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests" }, { "acknowledgments": [ { "names": [ "Gregory Ramsperger", "Ryan Moak" ] } ], "cve": "CVE-2017-2670", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2017-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1438885" } ], "notes": [ { "category": "description", "text": "It was found that with non-clean TCP close, Websocket server gets into infinite loop on every IO thread, effectively causing DoS.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: IO thread DoS via unclean Websocket closing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2670" }, { "category": "external", "summary": "RHBZ#1438885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2670", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2670" } ], "release_date": "2017-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: IO thread DoS via unclean Websocket closing" }, { "acknowledgments": [ { "names": [ "Liao Xinxi" ], "organization": "NSFOCUS" } ], "cve": "CVE-2017-7525", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1462702" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jackson-databind (in Satellite 6.0 and 6.1) and candlepin (which embeds a copy of jackson-databind in Satellite 6.2) as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time:\n\nCandlepin currently uses the default type resolution configuration for the ObjectMappers it creates/uses. Nowhere in candlepin do we enable global polymorphic deserialization via enableDefaultTyping(...), therefore based on the documentation sited BZ 1462702 , candlepin should not be affected.\n\nHowever as the vulnerable software ships with the product we have marked them as vulnerable to ensure the issue is tracked.\n\nJBoss EAP 7.x only uses the vulnerable Jackson Databind library for marshalling and unmarshalling of JSON objects passed to JAX-RS webservices. Some advise about how to remain safe when using JAX-RS webservices on JBoss EAP 7.x is available here: \n\nhttps://access.redhat.com/solutions/3279231\n\nAlthough JBoss Fuse ships the vulnerable version of jackson-databind, it does not call on enableDefaultTyping() for any polymorphic deserialization operations which is the root cause of this vulnerability. We have raised a Jira tracker to ensure that jackson-databind will be upgraded for Fuse 7.0, however due to feasibility issues jackson-databind cannot be upgraded in JBoss Fuse 6.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7525" }, { "category": "external", "summary": "RHBZ#1462702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7525", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7525" } ], "release_date": "2017-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" }, { "category": "workaround", "details": "Mitigation to this problem is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Red Hat JBoss EAP 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper" }, { "acknowledgments": [ { "names": [ "Gunnar Morling" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2017-7536", "discovery_date": "2017-06-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1465573" } ], "notes": [ { "category": "description", "text": "It was found that when the security manager\u0027s reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().", "title": "Vulnerability description" }, { "category": "summary", "text": "hibernate-validator: Privilege escalation when running under the security manager", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7536" }, { "category": "external", "summary": "RHBZ#1465573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7536", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7536" } ], "release_date": "2017-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hibernate-validator: Privilege escalation when running under the security manager" }, { "acknowledgments": [ { "names": [ "Stuart Douglas" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2017-7559", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2017-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1481665" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7559" }, { "category": "external", "summary": "RHBZ#1481665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481665" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7559", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7559" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7559", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7559" } ], "release_date": "2017-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666)" }, { "acknowledgments": [ { "names": [ "Stuart Douglas" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2017-12165", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2017-09-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1490301" } ], "notes": [ { "category": "description", "text": "It was discovered that Undertow processes http request headers with unusual whitespaces which can cause possible http request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: improper whitespace parsing leading to potential HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12165" }, { "category": "external", "summary": "RHBZ#1490301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490301" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12165", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12165" } ], "release_date": "2017-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: improper whitespace parsing leading to potential HTTP request smuggling" }, { "acknowledgments": [ { "names": [ "Brian Stansberry", "Jeremy Choi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2017-12167", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2017-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1491612" } ], "notes": [ { "category": "description", "text": "It was found that properties based files of the management and the application realm configuration that contain user to role mapping are world readable allowing access to users and roles information to all the users logged in to the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP-7: Wrong privileges on multiple property files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12167" }, { "category": "external", "summary": "RHBZ#1491612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12167" } ], "release_date": "2017-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-13T17:31:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss EAP 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3456" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EAP-7: Wrong privileges on multiple property files" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.