CERTA-2012-AVI-042
Vulnerability from certfr_avis
Une vulnérabilité dans le module mod_cluster de JBoss Enterprise Application Platform pour Red Hat Linux permet à un utilisateur malintentionné distant de contourner la politique de sécurité, voler des identifiants de session et d'élever ses privilèges.
Description
Le module mod_cluster de JBoss Enterprise Application Platform pour Red Hat Linux autorise les noeuds de travail à s'enregistrer auprès de n'importe quel hôte virtuel. Une personne malintentionnée peut alors forcer un enregistrement auprès d'un hôte virtuel externe qui ne met en place aucune restriction de sécurité et, ainsi, passer outre la politique de sécurité. L'attaquant peut alors voler des données sensibles comme des informations d'identification, afin d'élever ses privilèges, ou bien encore proposer du contenu malveillant à des utilisateurs légitimes.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
SolarWinds | Platform | JBoss Enterprise Application Platform 5 for RHEL 4 AS (mod_cluster-native) ; | ||
N/A | N/A | JBoss Enterprise Web Platform 5.1. | ||
Centreon | Web | JBoss Enterprise Web Server 1.0 for RHEL 6 Server ; | ||
SolarWinds | Platform | JBoss Enterprise Application Platform 5 for RHEL 6 AS (mod_cluster-native) ; | ||
SolarWinds | Platform | JBoss Enterprise Application Platform 5.1 ; | ||
Centreon | Web | JBoss Enterprise Web Server 1.0 for RHEL 5 Server ; | ||
SolarWinds | Platform | JBoss Enterprise Application Platform 5 for RHEL 5 AS (mod_cluster-native) ; | ||
Centreon | Web | JBoss Enterprise Web Server 1.0 for RHEL 4 AS ; | ||
N/A | N/A | JBoss Enterprise Web Platform 5 for RHEL 4 AS (mod_cluster-native) ; | ||
N/A | N/A | JBoss Enterprise Web Platform 5 for RHEL 5 Server (mod_cluster-native) ; | ||
Centreon | Web | JBoss Enterprise Web Server 1.0 ; | ||
N/A | N/A | JBoss Enterprise Web Platform 5 for RHEL 6 Server (mod_cluster-native) ; |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "JBoss Enterprise Application Platform 5 for RHEL 4 AS (mod_cluster-native) ;", "product": { "name": "Platform", "vendor": { "name": "SolarWinds", "scada": false } } }, { "description": "JBoss Enterprise Web Platform 5.1.", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "JBoss Enterprise Web Server 1.0 for RHEL 6 Server ;", "product": { "name": "Web", "vendor": { "name": "Centreon", "scada": false } } }, { "description": "JBoss Enterprise Application Platform 5 for RHEL 6 AS (mod_cluster-native) ;", "product": { "name": "Platform", "vendor": { "name": "SolarWinds", "scada": false } } }, { "description": "JBoss Enterprise Application Platform 5.1 ;", "product": { "name": "Platform", "vendor": { "name": "SolarWinds", "scada": false } } }, { "description": "JBoss Enterprise Web Server 1.0 for RHEL 5 Server ;", "product": { "name": "Web", "vendor": { "name": "Centreon", "scada": false } } }, { "description": "JBoss Enterprise Application Platform 5 for RHEL 5 AS (mod_cluster-native) ;", "product": { "name": "Platform", "vendor": { "name": "SolarWinds", "scada": false } } }, { "description": "JBoss Enterprise Web Server 1.0 for RHEL 4 AS ;", "product": { "name": "Web", "vendor": { "name": "Centreon", "scada": false } } }, { "description": "JBoss Enterprise Web Platform 5 for RHEL 4 AS (mod_cluster-native) ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "JBoss Enterprise Web Platform 5 for RHEL 5 Server (mod_cluster-native) ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "JBoss Enterprise Web Server 1.0 ;", "product": { "name": "Web", "vendor": { "name": "Centreon", "scada": false } } }, { "description": "JBoss Enterprise Web Platform 5 for RHEL 6 Server (mod_cluster-native) ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nLe module mod_cluster de JBoss Enterprise Application Platform pour Red\nHat Linux autorise les noeuds de travail \u00e0 s\u0027enregistrer aupr\u00e8s de\nn\u0027importe quel h\u00f4te virtuel. Une personne malintentionn\u00e9e peut alors\nforcer un enregistrement aupr\u00e8s d\u0027un h\u00f4te virtuel externe qui ne met en\nplace aucune restriction de s\u00e9curit\u00e9 et, ainsi, passer outre la\npolitique de s\u00e9curit\u00e9. L\u0027attaquant peut alors voler des donn\u00e9es\nsensibles comme des informations d\u0027identification, afin d\u0027\u00e9lever ses\nprivil\u00e8ges, ou bien encore proposer du contenu malveillant \u00e0 des\nutilisateurs l\u00e9gitimes.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2011-4608", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4608" } ], "initial_release_date": "2012-01-31T00:00:00", "last_revision_date": "2012-01-31T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2012:0035 du 18 janvier 2012 :", "url": "http://rhn.redhat.com/errata/RHSA-2012-0035.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2012:0038 du 18 janvier 2012 :", "url": "http://rhn.redhat.com/errata/RHSA-2012-0038.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2012:0039 du 18 janvier 2012 :", "url": "http://rhn.redhat.com/errata/RHSA-2012-0039.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2012:0036 du 18 janvier 2012 :", "url": "http://rhn.redhat.com/errata/RHSA-2012-0036.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2012:0037 du 18 janvier 2012 :", "url": "http://rhn.redhat.com/errata/RHSA-2012-0037.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2012:0040 du 18 janvier 2012 :", "url": "http://rhn.redhat.com/errata/RHSA-2012-0040.html" } ], "reference": "CERTA-2012-AVI-042", "revisions": [ { "description": "version initiale.", "revision_date": "2012-01-31T00:00:00.000000" } ], "risks": [ { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Une vuln\u00e9rabilit\u00e9 dans le module \u003cspan class=\"textit\"\u003emod_cluster\u003c/span\u003e\nde \u003cspan class=\"textit\"\u003eJBoss Enterprise Application Platform\u003c/span\u003e\npour \u003cspan class=\"textit\"\u003eRed Hat Linux\u003c/span\u003e permet \u00e0 un utilisateur\nmalintentionn\u00e9 distant de contourner la politique de s\u00e9curit\u00e9, voler des\nidentifiants de session et d\u0027\u00e9lever ses privil\u00e8ges.\n", "title": "Vuln\u00e9rabilit\u00e9 dans JBoss", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 redhat RHSA-2012:0037", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 redhat RHSA-2012:0040", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 redhat RHSA-2012:0038", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 redhat RHSA-2012:0039", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 redhat RHSA-2012:0035", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 redhat RHSA-2012:0036", "url": null } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.