Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2021-44906 CVE-2022-24823 CVE-2022-25647 |
CWE-ID | CWE-400 CWE-378 CWE-502 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
eap7-wildfly-http-client (Red Hat package) Operating systems & Components / Operating system package or component eap7-wildfly-elytron (Red Hat package) Operating systems & Components / Operating system package or component eap7-wildfly (Red Hat package) Operating systems & Components / Operating system package or component eap7-undertow (Red Hat package) Operating systems & Components / Operating system package or component eap7-netty-transport-native-epoll (Red Hat package) Operating systems & Components / Operating system package or component eap7-netty-tcnative (Red Hat package) Operating systems & Components / Operating system package or component eap7-netty (Red Hat package) Operating systems & Components / Operating system package or component eap7-jboss-server-migration (Red Hat package) Operating systems & Components / Operating system package or component eap7-jboss-remoting (Red Hat package) Operating systems & Components / Operating system package or component eap7-jboss-jsf (Red Hat package) Operating systems & Components / Operating system package or component eap7-jberet (Red Hat package) Operating systems & Components / Operating system package or component eap7-jackson-databind (Red Hat package) Operating systems & Components / Operating system package or component eap7-hibernate (Red Hat package) Operating systems & Components / Operating system package or component eap7-hal-console (Red Hat package) Operating systems & Components / Operating system package or component eap7-wildfly-openssl (Red Hat package) Operating systems & Components / Operating system package or component eap7-wildfly-openssl-el7 (Red Hat package) Operating systems & Components / Operating system package or component eap7-picketlink-federation (Red Hat package) Operating systems & Components / Operating system package or component eap7-picketlink-bindings (Red Hat package) Operating systems & Components / Operating system package or component eap7-picketbox (Red Hat package) Operating systems & Components / Operating system package or component eap7-jandex (Red Hat package) Operating systems & Components / Operating system package or component eap7-ironjacamar (Red Hat package) Operating systems & Components / Operating system package or component eap7-gson (Red Hat package) Operating systems & Components / Operating system package or component eap7-glassfish-jsf (Red Hat package) Operating systems & Components / Operating system package or component eap7-apache-cxf (Red Hat package) Operating systems & Components / Operating system package or component JBoss Enterprise Application Platform Server applications / Application servers |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU64030
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-44906
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.
MitigationInstall updates from vendor's website.
eap7-wildfly-http-client (Red Hat package): 1.1.11-1.SP1_redhat_00001.1.el7eap
eap7-wildfly-elytron (Red Hat package): 1.15.11-1.Final_redhat_00002.1.el7eap - 1.15.12-1.Final_redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): 7.4.4-3.GA_redhat_00011.1.el7eap - 7.4.5-3.GA_redhat_00001.1.el7eap
eap7-undertow (Red Hat package): 2.2.16-1.Final_redhat_00001.1.el7eap - 2.2.17-2.SP4_redhat_00001.1.el7eap
eap7-netty-transport-native-epoll (Red Hat package): 4.1.72-1.Final_redhat_00001.1.el7eap
eap7-netty-tcnative (Red Hat package): 2.0.48-1.Final_redhat_00001.1.el7eap
eap7-netty (Red Hat package): 4.1.72-4.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): 1.10.0-15.Final_redhat_00014.1.el7eap - 1.10.0-16.Final_redhat_00015.1.el7eap
eap7-jboss-remoting (Red Hat package): 5.0.24-1.SP1_redhat_00001.1.el7eap
eap7-jboss-jsf (Red Hat package): api_2.3_spec-3.0.0-4.SP05_redhat_00002.1.el7eap
eap7-jberet (Red Hat package): 1.3.9-1.SP1_redhat_00001.1.el7eap
eap7-jackson-databind (Red Hat package): 2.12.6.1-1.redhat_00003.1.el7eap
eap7-hibernate (Red Hat package): 5.3.25-1.Final_redhat_00002.1.el7eap - 5.3.26-1.Final_redhat_00002.2.el7eap
eap7-hal-console (Red Hat package): 3.3.9-1.Final_redhat_00001.1.el7eap - 3.3.12-1.Final_redhat_00001.1.el7eap
JBoss Enterprise Application Platform: 7.4.0 - 7.4.5
eap7-wildfly-openssl (Red Hat package): 2.2.0-3.Final_redhat_00002.1.el7eap
eap7-wildfly-openssl-el7 (Red Hat package): before x86_64-2.2.2-1.Final_redhat_00002.1.el7eap
eap7-picketlink-federation (Red Hat package): before 2.5.5-21.SP12_redhat_00011.1.el7eap
eap7-picketlink-bindings (Red Hat package): before 2.5.5-26.SP12_redhat_00014.1.el7eap
eap7-picketbox (Red Hat package): before 5.0.3-10.Final_redhat_00009.1.el7eap
eap7-jandex (Red Hat package): before 2.4.2-1.Final_redhat_00001.1.el7eap
eap7-ironjacamar (Red Hat package): before 1.5.3-2.SP1_redhat_00001.1.el7eap
eap7-gson (Red Hat package): before 2.8.9-1.redhat_00001.1.el7eap
eap7-glassfish-jsf (Red Hat package): before 2.3.14-4.SP05_redhat_00001.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.3.13-1.redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2022:5892
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62849
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-24823
CWE-ID:
CWE-378 - Creation of Temporary File With Insecure Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to usage of insecure permissions for temporary files. A local user can view contents of temporary files and gain access to sensitive information.
Install updates from vendor's website.
eap7-wildfly-http-client (Red Hat package): 1.1.11-1.SP1_redhat_00001.1.el7eap
eap7-wildfly-elytron (Red Hat package): 1.15.11-1.Final_redhat_00002.1.el7eap - 1.15.12-1.Final_redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): 7.4.4-3.GA_redhat_00011.1.el7eap - 7.4.5-3.GA_redhat_00001.1.el7eap
eap7-undertow (Red Hat package): 2.2.16-1.Final_redhat_00001.1.el7eap - 2.2.17-2.SP4_redhat_00001.1.el7eap
eap7-netty-transport-native-epoll (Red Hat package): 4.1.72-1.Final_redhat_00001.1.el7eap
eap7-netty-tcnative (Red Hat package): 2.0.48-1.Final_redhat_00001.1.el7eap
eap7-netty (Red Hat package): 4.1.72-4.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): 1.10.0-15.Final_redhat_00014.1.el7eap - 1.10.0-16.Final_redhat_00015.1.el7eap
eap7-jboss-remoting (Red Hat package): 5.0.24-1.SP1_redhat_00001.1.el7eap
eap7-jboss-jsf (Red Hat package): api_2.3_spec-3.0.0-4.SP05_redhat_00002.1.el7eap
eap7-jberet (Red Hat package): 1.3.9-1.SP1_redhat_00001.1.el7eap
eap7-jackson-databind (Red Hat package): 2.12.6.1-1.redhat_00003.1.el7eap
eap7-hibernate (Red Hat package): 5.3.25-1.Final_redhat_00002.1.el7eap - 5.3.26-1.Final_redhat_00002.2.el7eap
eap7-hal-console (Red Hat package): 3.3.9-1.Final_redhat_00001.1.el7eap - 3.3.12-1.Final_redhat_00001.1.el7eap
JBoss Enterprise Application Platform: 7.4.0 - 7.4.5
eap7-wildfly-openssl (Red Hat package): 2.2.0-3.Final_redhat_00002.1.el7eap
eap7-wildfly-openssl-el7 (Red Hat package): before x86_64-2.2.2-1.Final_redhat_00002.1.el7eap
eap7-picketlink-federation (Red Hat package): before 2.5.5-21.SP12_redhat_00011.1.el7eap
eap7-picketlink-bindings (Red Hat package): before 2.5.5-26.SP12_redhat_00014.1.el7eap
eap7-picketbox (Red Hat package): before 5.0.3-10.Final_redhat_00009.1.el7eap
eap7-jandex (Red Hat package): before 2.4.2-1.Final_redhat_00001.1.el7eap
eap7-ironjacamar (Red Hat package): before 1.5.3-2.SP1_redhat_00001.1.el7eap
eap7-gson (Red Hat package): before 2.8.9-1.redhat_00001.1.el7eap
eap7-glassfish-jsf (Red Hat package): before 2.3.14-4.SP05_redhat_00001.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.3.13-1.redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2022:5892
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64152
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-25647
CWE-ID:
CWE-502 - Deserialization of Untrusted Data
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to insecure input validation when processing serialized data passed to writeReplace() method. A remote attacker can pass specially crafted data to the application and perform a denial of service attack.
MitigationInstall updates from vendor's website.
eap7-wildfly-http-client (Red Hat package): 1.1.11-1.SP1_redhat_00001.1.el7eap
eap7-wildfly-elytron (Red Hat package): 1.15.11-1.Final_redhat_00002.1.el7eap - 1.15.12-1.Final_redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): 7.4.4-3.GA_redhat_00011.1.el7eap - 7.4.5-3.GA_redhat_00001.1.el7eap
eap7-undertow (Red Hat package): 2.2.16-1.Final_redhat_00001.1.el7eap - 2.2.17-2.SP4_redhat_00001.1.el7eap
eap7-netty-transport-native-epoll (Red Hat package): 4.1.72-1.Final_redhat_00001.1.el7eap
eap7-netty-tcnative (Red Hat package): 2.0.48-1.Final_redhat_00001.1.el7eap
eap7-netty (Red Hat package): 4.1.72-4.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): 1.10.0-15.Final_redhat_00014.1.el7eap - 1.10.0-16.Final_redhat_00015.1.el7eap
eap7-jboss-remoting (Red Hat package): 5.0.24-1.SP1_redhat_00001.1.el7eap
eap7-jboss-jsf (Red Hat package): api_2.3_spec-3.0.0-4.SP05_redhat_00002.1.el7eap
eap7-jberet (Red Hat package): 1.3.9-1.SP1_redhat_00001.1.el7eap
eap7-jackson-databind (Red Hat package): 2.12.6.1-1.redhat_00003.1.el7eap
eap7-hibernate (Red Hat package): 5.3.25-1.Final_redhat_00002.1.el7eap - 5.3.26-1.Final_redhat_00002.2.el7eap
eap7-hal-console (Red Hat package): 3.3.9-1.Final_redhat_00001.1.el7eap - 3.3.12-1.Final_redhat_00001.1.el7eap
JBoss Enterprise Application Platform: 7.4.0 - 7.4.5
eap7-wildfly-openssl (Red Hat package): 2.2.0-3.Final_redhat_00002.1.el7eap
eap7-wildfly-openssl-el7 (Red Hat package): before x86_64-2.2.2-1.Final_redhat_00002.1.el7eap
eap7-picketlink-federation (Red Hat package): before 2.5.5-21.SP12_redhat_00011.1.el7eap
eap7-picketlink-bindings (Red Hat package): before 2.5.5-26.SP12_redhat_00014.1.el7eap
eap7-picketbox (Red Hat package): before 5.0.3-10.Final_redhat_00009.1.el7eap
eap7-jandex (Red Hat package): before 2.4.2-1.Final_redhat_00001.1.el7eap
eap7-ironjacamar (Red Hat package): before 1.5.3-2.SP1_redhat_00001.1.el7eap
eap7-gson (Red Hat package): before 2.8.9-1.redhat_00001.1.el7eap
eap7-glassfish-jsf (Red Hat package): before 2.3.14-4.SP05_redhat_00001.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.3.13-1.redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2022:5892
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.