Multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 7



| Updated: 2025-01-20
Risk High
Patch available YES
Number of vulnerabilities 14
CVE-ID CVE-2023-5685
CVE-2024-47561
CVE-2021-3859
CVE-2023-39410
CVE-2023-3171
CVE-2022-41853
CVE-2022-34169
CVE-2024-28752
CVE-2023-26464
CVE-2022-46364
CVE-2021-4104
CVE-2022-23305
CVE-2022-23307
CVE-2020-9493
CVE-2022-23221
CWE-ID CWE-400
CWE-20
CWE-399
CWE-502
CWE-749
CWE-918
CWE-89
Exploitation vector Network
Public exploit Public exploit code for vulnerability #6 is available.
Public exploit code for vulnerability #7 is available.
Vulnerable software
JBoss Enterprise Application Platform
Server applications / Application servers

eap7-xml-security (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-xalan-j2 (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-wss4j (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-wildfly (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-log4j-jboss-logmanager (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-jboss-xnio-base (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-jboss-server-migration (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-jboss-marshalling (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-jboss-annotations (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-h2database (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-avro (Red Hat package)
Operating systems & Components / Operating system package or component

eap7-apache-cxf (Red Hat package)
Operating systems & Components / Operating system package or component

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 14 vulnerabilities.

1) Resource exhaustion

EUVDB-ID: #VU93103

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-5685

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources in NotifierState, when the chain of notifier states becomes problematically large. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU98024

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-47561

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input when parsing schema in Java SDK. A remote attacker can pass specially crafted schema to the application and execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Resource management error

EUVDB-ID: #VU60243

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-3859

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of client side invocation timeout within the application when handling HTTP/2 requests. A remote attacker can send specially crafted requests to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Deserialization of Untrusted Data

EUVDB-ID: #VU83219

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-39410

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to reader can consume memory beyond the allowed constraints and thus lead to out of memory on the system, when deserializing untrusted or corrupted data. A remote attacker can pass specially crafted data to the application and perform a denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Resource exhaustion

EUVDB-ID: #VU82197

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-3171

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. A remote attacker can send specially crafted requests using these classes to trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Exposed dangerous method or function

EUVDB-ID: #VU69302

Risk: High

CVSSv4.0: 8.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]

CVE-ID: CVE-2022-41853

CWE-ID: CWE-749 - Exposed Dangerous Method or Function

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to missing authorization when using java.sql.Statement or java.sql.PreparedStatement in hsqldb. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

7) Improper input validation

EUVDB-ID: #VU65495

Risk: High

CVSSv4.0: 8.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]

CVE-ID: CVE-2022-34169

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a remote non-authenticated attacker to compromise the affected system.

The vulnerability exists due to an integer truncation issue when processing malicious XSLT stylesheets. A remote non-authenticated attacker can pass specially crafted data to the application to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

8) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU87567

Risk: Medium

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-28752

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input in Aegis DataBinding. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Resource exhaustion

EUVDB-ID: #VU73244

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-26464

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (i.e., deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed can exhaust the available memory in the virtual machine and achieve denial of service when the object is deserialized.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU70444

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-46364

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input when parsing the href attribute of XOP:Include in MTOM requests. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Deserialization of Untrusted Data

EUVDB-ID: #VU58977

Risk: Medium

CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-4104

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data in JMSAppender, when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution.

Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) SQL injection

EUVDB-ID: #VU59691

Risk: Medium

CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-23305

CWE-ID: CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the JDBCAppender. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Note, a non-default configuration with enabled JDBCAppender is required to exploit the vulnerability.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Deserialization of Untrusted Data

EUVDB-ID: #VU59693

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2022-23307,CVE-2020-9493

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Deserialization of Untrusted Data

EUVDB-ID: #VU61938

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2022-23221

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data within jdbc:h2:mem. A remote attacker can pass specially crafted JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.3.0 - 7.3.10

eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap

eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap

eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap

eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap

eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap

eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap

eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap

eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap

eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap

eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap

eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap

eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:10207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###