The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Red Hat JBoss EAP

vulnerability alert CVE-2014-9970

Jasypt: information disclosure via Password Hash Comparison

Synthesis of the vulnerability

Impacted products: JBoss EAP by Red Hat.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 31/08/2017.
Identifiers: CVE-2014-9970, RHSA-2017:2546-01, RHSA-2017:2547-01, RHSA-2017:2808-01, RHSA-2017:2809-01, RHSA-2017:2810-01, RHSA-2017:2811-01, RHSA-2018:0294-01, VIGILANCE-VUL-23641.

Description of the vulnerability

An attacker can bypass access restrictions to data via Password Hash Comparison of Jasypt, in order to obtain sensitive information.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2016-6311

JBoss Enterprise Application Platform: information disclosure via Internal IP Address

Synthesis of the vulnerability

Impacted products: JBoss EAP by Red Hat.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Confidence: confirmed by the editor (5/5).
Creation date: 23/08/2017.
Identifiers: 1362735, CVE-2016-6311, RHSA-2017:3454-01, RHSA-2017:3455-01, RHSA-2017:3456-01, RHSA-2017:3458-01, VIGILANCE-VUL-23596.

Description of the vulnerability

An attacker can bypass access restrictions to data via Internal IP Address of JBoss Enterprise Application Platform, in order to obtain sensitive information.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2017-7525

jackson-databind: code execution via ObjectMapper readValue

Synthesis of the vulnerability

Impacted products: Debian, Fedora, Oracle Communications, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle Internet Directory, Tuxedo, Oracle Virtual Directory, WebLogic, Puppet, RHEL, JBoss EAP by Red Hat.
Severity: 2/4.
Consequences: user access/rights.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 01/08/2017.
Identifiers: cpuapr2018, cpujan2019, cpujul2018, cpuoct2018, CVE-2017-7525, DSA-4004-1, FEDORA-2017-6a75c816fa, FEDORA-2017-8df9efed5f, FEDORA-2017-f452765e1e, FEDORA-2018-bbf8c38b51, FEDORA-2018-e4b025841e, ibm10715641, ibm10738249, RHSA-2017:1834-01, RHSA-2017:1835-01, RHSA-2017:1836-01, RHSA-2017:1837-01, RHSA-2017:1839-01, RHSA-2017:1840-01, RHSA-2017:2477-01, RHSA-2017:2546-01, RHSA-2017:2547-01, RHSA-2017:2633-01, RHSA-2017:2635-01, RHSA-2017:2636-01, RHSA-2017:2637-01, RHSA-2017:2638-01, RHSA-2017:3454-01, RHSA-2017:3455-01, RHSA-2017:3456-01, RHSA-2017:3458-01, RHSA-2018:0294-01, RHSA-2018:1447-01, RHSA-2018:1448-01, RHSA-2018:1449-01, RHSA-2018:1450-01, RHSA-2018:1451-01, VIGILANCE-VUL-23406.

Description of the vulnerability

An attacker can use a vulnerability via ObjectMapper readValue() of jackson-databind, in order to run code.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2016-4978

Apache ActiveMQ: code execution via Artemis Deserialization

Synthesis of the vulnerability

Impacted products: JBoss EAP by Red Hat.
Severity: 2/4.
Consequences: user access/rights.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 01/08/2017.
Identifiers: CVE-2016-4978, RHSA-2017:1834-01, RHSA-2017:1835-01, RHSA-2017:1836-01, RHSA-2017:1837-01, RHSA-2017:3454-01, RHSA-2017:3455-01, RHSA-2017:3456-01, RHSA-2017:3458-01, RHSA-2018:1447-01, RHSA-2018:1448-01, RHSA-2018:1449-01, RHSA-2018:1450-01, RHSA-2018:1451-01, VIGILANCE-VUL-23405.

Description of the vulnerability

An attacker can use a vulnerability via Artemis Deserialization of Apache ActiveMQ, in order to run code.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2017-3163

Lucene Solr: directory traversal

Synthesis of the vulnerability

Impacted products: Debian, JBoss EAP by Red Hat.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 31/07/2017.
Identifiers: CVE-2017-3163, DLA-1046-1, DSA-4124-1, RHSA-2018:1447-01, RHSA-2018:1448-01, RHSA-2018:1449-01, RHSA-2018:1450-01, RHSA-2018:1451-01, VIGILANCE-VUL-23395.

Description of the vulnerability

An attacker can traverse directories of Lucene Solr, in order to read a file outside the service root path.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability note CVE-2017-9788

Apache httpd: information disclosure via mod_auth_digest

Synthesis of the vulnerability

Impacted products: Apache httpd, Mac OS X, Blue Coat CAS, Debian, Junos Space, openSUSE Leap, Solaris, VirtualBox, RHEL, JBoss EAP by Red Hat, Symantec Content Analysis, Ubuntu.
Severity: 3/4.
Consequences: data reading.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 13/07/2017.
Identifiers: APPLE-SA-2017-09-25-1, bulletinjul2017, cpuoct2017, CVE-2017-9788, DLA-1028-1, DSA-3913-1, HT208144, HT208221, JSA10838, openSUSE-SU-2017:2016-1, RHSA-2017:2478-01, RHSA-2017:2479-01, RHSA-2017:2483-01, RHSA-2017:3113-01, RHSA-2017:3114-01, RHSA-2017:3193-01, RHSA-2017:3194-01, RHSA-2017:3195-01, RHSA-2017:3239-01, RHSA-2017:3240-01, SYMSA1457, USN-3370-1, USN-3370-2, VIGILANCE-VUL-23249.

Description of the vulnerability

An attacker can bypass access restrictions to data via mod_auth_digest of Apache httpd, in order to obtain sensitive information.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2017-2595 CVE-2017-2666 CVE-2017-2670

Red Hat JBoss Enterprise Application Platform: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Red Hat JBoss Enterprise Application Platform.
Impacted products: Debian, JBoss EAP by Red Hat.
Severity: 3/4.
Consequences: data reading, data creation/edition, denial of service on server, denial of service on service.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 08/06/2017.
Identifiers: CVE-2017-2595, CVE-2017-2666, CVE-2017-2670, DSA-3906-1, RHSA-2017:1409-01, RHSA-2017:1410-01, RHSA-2017:1411-01, RHSA-2017:1412-01, RHSA-2017:1548-01, RHSA-2017:1549-01, RHSA-2017:1550-01, RHSA-2017:1551-01, RHSA-2017:1552-01, RHSA-2017:1658-01, RHSA-2017:1659-01, RHSA-2017:3454-01, RHSA-2017:3455-01, RHSA-2017:3456-01, RHSA-2017:3458-01, VIGILANCE-VUL-22923.

Description of the vulnerability

Several vulnerabilities were announced in Red Hat JBoss Enterprise Application Platform.

An attacker can traverse directories via the log viewer, in order to read a file outside the root path. [severity:2/4; CVE-2017-2595]

An attacker can tamper with HTTP response bodies by including invalid characters in the request. [severity:2/4; CVE-2017-2666]

An attacker can generate an infinite loop, in order to trigger a denial of service. [severity:3/4; CVE-2017-2670]
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2017-5664

Apache Tomcat: error page tampering

Synthesis of the vulnerability

An attacker can trigger an HTTP error in Apache Tomcat, in order to corrupt the error page documents.
Impacted products: Tomcat, Blue Coat CAS, Debian, Fedora, HPE NNMi, HP-UX, Junos Space, MySQL Community, MySQL Enterprise, openSUSE Leap, Oracle Fusion Middleware, Solaris, Tuxedo, WebLogic, Percona Server, RHEL, JBoss EAP by Red Hat, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, data creation/edition.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 06/06/2017.
Identifiers: bulletinjul2017, cpuapr2018, CVE-2017-5664, DLA-996-1, DSA-3891-1, DSA-3892-1, FEDORA-2017-63789c8c29, FEDORA-2017-e4638a345c, HPESBUX03828, JSA10838, KM03302206, openSUSE-SU-2017:3069-1, RHSA-2017:1801-01, RHSA-2017:1802-01, RHSA-2017:1809-01, RHSA-2017:2493-01, RHSA-2017:2494-01, RHSA-2017:2633-01, RHSA-2017:2635-01, RHSA-2017:2636-01, RHSA-2017:2637-01, RHSA-2017:2638-01, RHSA-2017:3080-01, RHSA-2017:3081-01, SA156, SUSE-SU-2017:3039-1, SUSE-SU-2017:3059-1, SUSE-SU-2017:3279-1, SUSE-SU-2018:1847-1, USN-3519-1, VIGILANCE-VUL-22907.

Description of the vulnerability

The Apache Tomcat product offers a web service.

HTTP error pages may be customized. However, when the page content is provided by a static document instead of a servlet output, Tomcat allows to tamper with this source document.

An attacker can therefore trigger an HTTP error in Apache Tomcat, in order to corrupt the error page documents.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability note CVE-2017-7503

Red Hat JBoss EAP: external XML entity injection via javax.xml.transform.TransformerFactory

Synthesis of the vulnerability

An attacker can transmit malicious XML data via javax.xml.transform.TransformerFactory to Red Hat JBoss EAP, in order to read a file, scan sites, or trigger a denial of service.
Impacted products: JBoss EAP by Red Hat.
Severity: 2/4.
Consequences: data reading, denial of service on service.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 19/05/2017.
Identifiers: 1451960, CVE-2017-7503, VIGILANCE-VUL-22769.

Description of the vulnerability

XML data can contain external entities (DTD):
  <!ENTITY name SYSTEM "file">
  <!ENTITY name SYSTEM "http://server/file">
A program which reads these XML data can replace these entities by data coming from the indicated file. When the program uses XML data coming from an untrusted source, this behavior leads to:
 - content disclosure from files of the server
 - private web site scan
 - a denial of service by opening a blocking file
This feature must be disabled to process XML data coming from an untrusted source.

However, the Red Hat JBoss EAP parser allows external entities.

An attacker can therefore transmit malicious XML data via javax.xml.transform.TransformerFactory to Red Hat JBoss EAP, in order to read a file, scan sites, or trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2016-9606

Red Hat JBoss EAP: code execution via RESTEasy YamlProvider

Synthesis of the vulnerability

Impacted products: JBoss EAP by Red Hat.
Severity: 3/4.
Consequences: user access/rights.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 19/05/2017.
Identifiers: CVE-2016-9606, RHSA-2017:1253-01, RHSA-2017:1254-01, RHSA-2017:1255-01, RHSA-2017:1256-01, RHSA-2017:1260-01, RHSA-2017:1409-01, RHSA-2017:1410-01, RHSA-2017:1411-01, RHSA-2017:1412-01, RHSA-2017:1675-01, RHSA-2017:1676-01, VIGILANCE-VUL-22767.

Description of the vulnerability

An attacker can use a vulnerability via RESTEasy YamlProvider of Red Hat JBoss EAP, in order to run code.
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Red Hat JBoss EAP: