This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Redhat First view 2013-09-30
Product Jboss Fuse Last view 2024-08-21
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:* 25
cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:* 19
cpe:2.3:a:redhat:jboss_fuse:6.1.0:beta:*:*:*:*:*:* 7
cpe:2.3:a:redhat:jboss_fuse:6.3:*:*:*:*:*:*:* 4

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2024-08-21 CVE-2024-7885

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.

7.5 2023-10-10 CVE-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

7.5 2023-02-23 CVE-2022-4492

The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.

4.9 2022-09-01 CVE-2022-2764

A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.

7.5 2022-08-05 CVE-2022-2053

When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) as an error state and not forward requests to the worker for a while. In mod_cluster, this continues until the next STATUS request (10 seconds intervals) from the application server updates the server state. So, in the worst case, it can result in "All workers are in error state" and mod_cluster responds "503 Service Unavailable" for a while (up to 10 seconds). In mod_proxy_balancer, it does not forward requests to the worker until the "retry" timeout passes. However, luckily, mod_proxy_balancer has "forcerecovery" setting (On by default; this parameter can force the immediate recovery of all workers without considering the retry parameter of the workers if all workers of a balancer are in error state.). So, unlike mod_cluster, mod_proxy_balancer does not result in responding "503 Service Unavailable". An attacker could use this behavior to send a malicious request and trigger server errors, resulting in DoS (denial of service). This flaw was fixed in Undertow 2.2.19.Final, Undertow 2.3.0.Alpha2.

7.5 2021-12-14 CVE-2021-4104

JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

5.3 2021-08-05 CVE-2021-3642

A flaw was found in Wildfly Elytron in versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.

5.9 2021-06-02 CVE-2020-14340

A vulnerability was discovered in XNIO where file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. It may allow the attacker to cause a denial of service. It affects XNIO versions 3.6.0.Beta1 through 3.8.1.Final.

7.4 2021-03-16 CVE-2021-20218

A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2

7.5 2021-02-23 CVE-2020-27782

A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1.

2.7 2021-02-11 CVE-2020-1717

A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.

3.3 2021-02-11 CVE-2020-10734

A vulnerability was found in keycloak in the way that the OIDC logout endpoint does not have CSRF protection. Versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes are believed to be vulnerable.

6.5 2020-11-02 CVE-2020-25689

A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial of service. The highest threat from this vulnerability is to system availability.

7.5 2020-10-06 CVE-2020-25644

A memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. It may allow the attacker to cause OOM leading to a denial of service. The highest threat from this vulnerability is to system availability.

7.5 2020-09-23 CVE-2020-10714

A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

7.5 2020-09-16 CVE-2020-10718

A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process API has an exposed setting of the Thread Context Classloader (TCCL). This setting is exposed as a public method, which can bypass the security manager. The highest threat from this vulnerability is to confidentiality.

6.5 2020-07-24 CVE-2020-14307

A vulnerability was found in Wildfly's Enterprise Java Beans (EJB) versions shipped with Red Hat JBoss EAP 7, where SessionOpenInvocations are never removed from the remote InvocationTracker after a response is received in the EJB Client, as well as the server. This flaw allows an attacker to craft a denial of service attack to make the service unavailable.

6.5 2020-07-24 CVE-2020-14297

A flaw was discovered in Wildfly's EJB Client as shipped with Red Hat JBoss EAP 7, where some specific EJB transaction objects may get accumulated over the time and can cause services to slow down and eventaully unavailable. An attacker can take advantage and cause denial of service attack and make services unavailable.

8.8 2020-05-13 CVE-2020-1714

A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.

8.8 2020-05-12 CVE-2020-1718

A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.

8.1 2020-04-21 CVE-2020-1757

A flaw was found in all undertow-2.x.x SP1 versions prior to undertow-2.0.30.SP1, all undertow-1.x.x and undertow-2.x.x versions prior to undertow-2.1.0.Final, where the Servlet container causes servletPath to normalize incorrectly by truncating the path after semicolon which may lead to an application mapping resulting in the security bypass.

9.1 2020-03-16 CVE-2019-14887

A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.

9.8 2020-03-02 CVE-2019-14892

A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.

7.5 2020-01-23 CVE-2019-14888

A vulnerability was found in the Undertow HTTP server in versions before 2.0.28.SP1 when listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.

4.3 2020-01-08 CVE-2019-14820

It was found that keycloak before version 8.0.0 exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.

CWE : Common Weakness Enumeration

%idName
15% (3) CWE-502 Deserialization of Untrusted Data
15% (3) CWE-20 Improper Input Validation
10% (2) CWE-345 Insufficient Verification of Data Authenticity
10% (2) CWE-287 Improper Authentication
10% (2) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
5% (1) CWE-532 Information Leak Through Log Files
5% (1) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
5% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
5% (1) CWE-352 Cross-Site Request Forgery (CSRF)
5% (1) CWE-310 Cryptographic Issues
5% (1) CWE-264 Permissions, Privileges, and Access Controls
5% (1) CWE-255 Credentials Management
5% (1) CWE-209 Information Exposure Through an Error Message

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-03-21 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa_10838.nasl - Type: ACT_GATHER_INFO
2017-04-25 Name: The remote Debian host is missing a security update.
File: debian_DLA-913.nasl - Type: ACT_GATHER_INFO
2017-04-25 Name: A web application running on the remote host is affected by a denial of servi...
File: activemq_5_14_5.nasl - Type: ACT_GATHER_INFO
2017-01-25 Name: A web application running on the remote host is affected by multiple vulnerab...
File: mysql_enterprise_monitor_3_2_2_1075.nasl - Type: ACT_GATHER_INFO
2017-01-25 Name: A web application running on the remote host is affected by a remote code exe...
File: mysql_enterprise_monitor_3_1_6_7959.nasl - Type: ACT_GATHER_INFO
2016-10-26 Name: An application server installed on the remote host is affected by multiple vu...
File: oracle_weblogic_server_cpu_oct_2016.nasl - Type: ACT_GATHER_INFO
2016-05-03 Name: The remote host has a web application installed that is affected by a remote ...
File: oracle_oats_cpu_apr_2016.nasl - Type: ACT_GATHER_INFO
2016-01-11 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-2540.nasl - Type: ACT_GATHER_INFO
2015-12-22 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20151221_jakarta_commons_collections_on_SL5_x.nasl - Type: ACT_GATHER_INFO
2015-12-22 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2015-2671.nasl - Type: ACT_GATHER_INFO
2015-12-22 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2015-2671.nasl - Type: ACT_GATHER_INFO
2015-12-21 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-2671.nasl - Type: ACT_GATHER_INFO
2015-12-15 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2015-618.nasl - Type: ACT_GATHER_INFO
2015-12-10 Name: The remote JBoss server is affected by multiple remote code execution vulnera...
File: jboss_java_serialize.nasl - Type: ACT_ATTACK
2015-12-04 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-2542.nasl - Type: ACT_GATHER_INFO
2015-12-04 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-2539.nasl - Type: ACT_GATHER_INFO
2015-12-04 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-2538.nasl - Type: ACT_GATHER_INFO
2015-12-04 Name: The remote Red Hat host is missing a security update.
File: redhat-RHSA-2015-2536.nasl - Type: ACT_GATHER_INFO
2015-12-04 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-2535.nasl - Type: ACT_GATHER_INFO
2015-12-03 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-2522.nasl - Type: ACT_GATHER_INFO
2015-12-03 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2015-2521.nasl - Type: ACT_GATHER_INFO
2015-12-02 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2015-2522.nasl - Type: ACT_GATHER_INFO
2015-12-01 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20151130_jakarta_commons_collections_on_SL6_x.nasl - Type: ACT_GATHER_INFO
2015-12-01 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20151130_apache_commons_collections_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2015-12-01 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2015-2522.nasl - Type: ACT_GATHER_INFO