Permissions, Privileges, and Access Controls in JBoss Enterprise Application Platform



| Updated: 2020-08-11
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2011-4608
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
JBoss Enterprise Application Platform
Server applications / Application servers

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU44355

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-4608

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

mod_cluster in JBoss Enterprise Application Platform 5.1.2 for Red Hat Linux allows worker nodes to register with arbitrary virtual hosts, which allows remote attackers to bypass intended access restrictions and provide malicious content, hijack sessions, and steal credentials by registering from an external vhost that does not enforce security constraints.

Mitigation

Install update from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 5.1.2

CPE2.3 External links

https://www.redhat.com/support/errata/RHSA-2012-0035.html
https://www.redhat.com/support/errata/RHSA-2012-0036.html
https://www.redhat.com/support/errata/RHSA-2012-0037.html
https://www.redhat.com/support/errata/RHSA-2012-0038.html
https://www.redhat.com/support/errata/RHSA-2012-0039.html
https://www.redhat.com/support/errata/RHSA-2012-0040.html
https://www.securityfocus.com/bid/51554
https://www.securitytracker.com/id?1026545
https://bugzilla.redhat.com/show_bug.cgi?id=767020
https://exchange.xforce.ibmcloud.com/vulnerabilities/72460


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###