Risk | High |
Patch available | YES |
Number of vulnerabilities | 14 |
CVE-ID | CVE-2023-5685 CVE-2024-47561 CVE-2021-3859 CVE-2023-39410 CVE-2023-3171 CVE-2022-41853 CVE-2022-34169 CVE-2024-28752 CVE-2023-26464 CVE-2022-46364 CVE-2021-4104 CVE-2022-23305 CVE-2022-23307 CVE-2020-9493 CVE-2022-23221 |
CWE-ID | CWE-400 CWE-20 CWE-399 CWE-502 CWE-749 CWE-918 CWE-89 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #6 is available. Public exploit code for vulnerability #7 is available. |
Vulnerable software |
JBoss Enterprise Application Platform Server applications / Application servers eap7-xml-security (Red Hat package) Operating systems & Components / Operating system package or component eap7-xalan-j2 (Red Hat package) Operating systems & Components / Operating system package or component eap7-wss4j (Red Hat package) Operating systems & Components / Operating system package or component eap7-wildfly (Red Hat package) Operating systems & Components / Operating system package or component eap7-log4j-jboss-logmanager (Red Hat package) Operating systems & Components / Operating system package or component eap7-jboss-xnio-base (Red Hat package) Operating systems & Components / Operating system package or component eap7-jboss-server-migration (Red Hat package) Operating systems & Components / Operating system package or component eap7-jboss-marshalling (Red Hat package) Operating systems & Components / Operating system package or component eap7-jboss-annotations (Red Hat package) Operating systems & Components / Operating system package or component eap7-h2database (Red Hat package) Operating systems & Components / Operating system package or component eap7-avro (Red Hat package) Operating systems & Components / Operating system package or component eap7-apache-cxf (Red Hat package) Operating systems & Components / Operating system package or component |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 14 vulnerabilities.
EUVDB-ID: #VU93103
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-5685
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in NotifierState, when the chain of notifier states becomes problematically large. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98024
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-47561
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient validation of user-supplied input when parsing schema in Java SDK. A remote attacker can pass specially crafted schema to the application and execute arbitrary code on the system.
Install updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60243
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-3859
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper handling of client side invocation timeout within the application when handling HTTP/2 requests. A remote attacker can send specially crafted requests to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU83219
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39410
CWE-ID:
CWE-502 - Deserialization of Untrusted Data
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to reader can consume memory beyond the allowed constraints and thus lead to out of memory on the system, when deserializing untrusted or corrupted data. A remote attacker can pass specially crafted data to the application and perform a denial of service attack.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82197
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3171
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. A remote attacker can send specially crafted requests using these classes to trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69302
Risk: High
CVSSv4.0: 8.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2022-41853
CWE-ID:
CWE-749 - Exposed Dangerous Method or Function
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to missing authorization when using java.sql.Statement or java.sql.PreparedStatement in hsqldb. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU65495
Risk: High
CVSSv4.0: 8.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2022-34169
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to compromise the affected system.
The vulnerability exists due to an integer truncation issue when processing malicious XSLT stylesheets. A remote non-authenticated attacker can pass specially crafted data to the application to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.
Install updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU87567
Risk: Medium
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-28752
CWE-ID:
CWE-918 - Server-Side Request Forgery (SSRF)
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input in Aegis DataBinding. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU73244
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-26464
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (i.e., deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed can exhaust the available memory in the virtual machine and achieve denial of service when the object is deserialized.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70444
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-46364
CWE-ID:
CWE-918 - Server-Side Request Forgery (SSRF)
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input when parsing the href attribute of XOP:Include in MTOM requests. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58977
Risk: Medium
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-4104
CWE-ID:
CWE-502 - Deserialization of Untrusted Data
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data in JMSAppender, when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution.
Note this issue only affects Log4j 1.2 when specifically configured to
use JMSAppender, which is not the default.
Install updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59691
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-23305
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the JDBCAppender. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Note, a non-default configuration with enabled JDBCAppender is required to exploit the vulnerability.
Install updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59693
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-23307,CVE-2020-9493
CWE-ID:
CWE-502 - Deserialization of Untrusted Data
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61938
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-23221
CWE-ID:
CWE-502 - Deserialization of Untrusted Data
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data within jdbc:h2:mem. A remote attacker can pass specially crafted JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
JBoss Enterprise Application Platform: 7.3.0 - 7.3.10
eap7-xml-security (Red Hat package): before 2.2.3-2.redhat_00001.1.el7eap
eap7-xalan-j2 (Red Hat package): before 2.7.1-38.redhat_00015.1.el7eap
eap7-wss4j (Red Hat package): before 2.3.3-2.redhat_00001.1.el7eap
eap7-wildfly (Red Hat package): before 7.3.11-4.GA_redhat_00002.1.el7eap
eap7-log4j-jboss-logmanager (Red Hat package): before 1.2.2-2.Final_redhat_00002.1.el7eap
eap7-jboss-xnio-base (Red Hat package): before 3.7.13-1.Final_redhat_00001.1.el7eap
eap7-jboss-server-migration (Red Hat package): before 1.7.2-12.Final_redhat_00013.1.el7eap
eap7-jboss-marshalling (Red Hat package): before 2.0.15-1.Final_redhat_00001.1.el7eap
eap7-jboss-annotations (Red Hat package): before api_1.3_spec-2.0.1-4.Final_redhat_00001.1.el7eap
eap7-h2database (Red Hat package): before 1.4.197-3.redhat_00004.1.el7eap
eap7-avro (Red Hat package): before 1.7.6-8.redhat_00003.1.el7eap
eap7-apache-cxf (Red Hat package): before 3.4.10-1.SP1_redhat_00001.1.el7eap
CPE2.3https://access.redhat.com/errata/RHSA-2024:10207
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.