Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-0250 (GCVE-0-2015-0250)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2548-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2548-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" }, { "name": "MDVSA-2015:203", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203" }, { "name": "DSA-3205", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3205" }, { "name": "1032781", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032781" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0138.html" }, { "name": "20150322 [CVE-2015-0250] Apache Batik Information Disclosure Vulnerability (XXE Injection)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/142" }, { "name": "RHSA-2016:0042", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xmlgraphics.apache.org/security.html" }, { "name": "RHSA-2016:0041", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0041.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-03T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2548-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2548-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" }, { "name": "MDVSA-2015:203", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203" }, { "name": "DSA-3205", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3205" }, { "name": "1032781", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032781" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0138.html" }, { "name": "20150322 [CVE-2015-0250] Apache Batik Information Disclosure Vulnerability (XXE Injection)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/142" }, { "name": "RHSA-2016:0042", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xmlgraphics.apache.org/security.html" }, { "name": "RHSA-2016:0041", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0041.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0250", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2548-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2548-1" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" }, { "name": "MDVSA-2015:203", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203" }, { "name": "DSA-3205", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3205" }, { "name": "1032781", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032781" }, { "name": "http://advisories.mageia.org/MGASA-2015-0138.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0138.html" }, { "name": "20150322 [CVE-2015-0250] Apache Batik Information Disclosure Vulnerability (XXE Injection)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Mar/142" }, { "name": "RHSA-2016:0042", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0042.html" }, { "name": "http://xmlgraphics.apache.org/security.html", "refsource": "CONFIRM", "url": "http://xmlgraphics.apache.org/security.html" }, { "name": "RHSA-2016:0041", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0041.html" }, { "name": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-0250", "datePublished": "2015-03-24T17:00:00", "dateReserved": "2014-11-18T00:00:00", "dateUpdated": "2024-08-06T04:03:10.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-0250\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-03-24T17:59:00.070\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de entidad externa XML (XXE) en los gr\u00e1ficos vectoriales redimensionables en las clases de conversi\u00f3n (1) PNG y (2) JPG en Apache Batik 1.x anterior a 1.8 permite a atacantes remotos leer ficheros arbitrarios o causar una denegaci\u00f3n de servicio a trav\u00e9s de un fichero de gr\u00e1ficos vectoriales redimensionables manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A63F39-30BE-443F-AF10-6245587D3359\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:batik:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.7\",\"matchCriteriaId\":\"7DC0508D-B46A-4282-83BD-5CEBDB76B7FB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.1.2\",\"matchCriteriaId\":\"494221AE-DB44-4CBA-B4F2-77769667B539\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2015-0138.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0041.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0042.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2015/Mar/142\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21963275\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3205\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:203\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1032781\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2548-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://xmlgraphics.apache.org/security.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://advisories.mageia.org/MGASA-2015-0138.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2015/Mar/142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21963275\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3205\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:203\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1032781\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2548-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://xmlgraphics.apache.org/security.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}],\"evaluatorComment\":\"\u003ca href=\\\"http://cwe.mitre.org/data/definitions/611.html\\\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e\"}}" } }
cnvd-2015-01865
Vulnerability from cnvd
Title: Apache Batik信息泄露漏洞
Description:
Apache Batik是一个基于Java技术的SVG(可扩展矢量图)工具包,可以查看、生成和处理SVG格式的图片。
Apache Batik存在安全漏洞,允许攻击者利用漏洞发送恶意SVG文件,获取敏感信息。
Severity: 中
Patch Name: Apache Batik信息泄露漏洞的补丁
Patch Description:
Apache Batik是一个基于Java技术的SVG(可扩展矢量图)工具包,可以查看、生成和处理SVG格式的图片。Apache Batik存在安全漏洞,允许攻击者利用漏洞发送恶意SVG文件,获取敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
Apache Batik 1.8+已经修复该漏洞,建议用户下载更新: http://xmlgraphics.apache.org/security.html
Reference: http://seclists.org/oss-sec/2015/q1/864
Name | Apache Batik |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2015-0250" } }, "description": "Apache Batik\u662f\u4e00\u4e2a\u57fa\u4e8eJava\u6280\u672f\u7684SVG(\u53ef\u6269\u5c55\u77e2\u91cf\u56fe)\u5de5\u5177\u5305,\u53ef\u4ee5\u67e5\u770b\u3001\u751f\u6210\u548c\u5904\u7406SVG\u683c\u5f0f\u7684\u56fe\u7247\u3002\r\n\r\nApache Batik\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u53d1\u9001\u6076\u610fSVG\u6587\u4ef6\uff0c\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002", "discovererName": "Luis Bernardo", "formalWay": "Apache Batik 1.8+\u5df2\u7ecf\u4fee\u590d\u8be5\u6f0f\u6d1e\uff0c\u5efa\u8bae\u7528\u6237\u4e0b\u8f7d\u66f4\u65b0\uff1a\r\nhttp://xmlgraphics.apache.org/security.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2015-01865", "openTime": "2015-03-20", "patchDescription": "Apache Batik\u662f\u4e00\u4e2a\u57fa\u4e8eJava\u6280\u672f\u7684SVG(\u53ef\u6269\u5c55\u77e2\u91cf\u56fe)\u5de5\u5177\u5305,\u53ef\u4ee5\u67e5\u770b\u3001\u751f\u6210\u548c\u5904\u7406SVG\u683c\u5f0f\u7684\u56fe\u7247\u3002Apache Batik\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u53d1\u9001\u6076\u610fSVG\u6587\u4ef6\uff0c\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Apache Batik\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Apache Batik" }, "referenceLink": "http://seclists.org/oss-sec/2015/q1/864", "serverity": "\u4e2d", "submitTime": "2015-03-19", "title": "Apache Batik\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e" }
rhsa-2016:0042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BPM Suite 6.1.5, which fixes one security issue, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BPM Suite is a business rules and processes management system\nfor the management, storage, creation, modification, and deployment of\nJBoss rules and BPMN2-compliant business processes.\n\nThis release of Red Hat JBoss BPM Suite 6.1.5 serves as a replacement for\nRed Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements,\nwhich are documented in the README.txt file included with the patch files.\n\nThe following security issue is also fixed with this release:\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nAll users of Red Hat JBoss BPM Suite 6.1.2 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.1.5.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0042", "url": "https://access.redhat.com/errata/RHSA-2016:0042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.1.0" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0042.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.5 update", "tracking": { "current_release_date": "2025-09-10T14:10:17+00:00", "generator": { "date": "2025-09-10T14:10:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2016:0042", "initial_release_date": "2016-01-14T18:34:44+00:00", "revision_history": [ { "date": "2016-01-14T18:34:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:38:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:10:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BPMS 6.1", "product": { "name": "Red Hat JBoss BPMS 6.1", "product_id": "Red Hat JBoss BPMS 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_bpms:6.1" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-14T18:34:44+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0042" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" } ] }
RHSA-2016:0042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BPM Suite 6.1.5, which fixes one security issue, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BPM Suite is a business rules and processes management system\nfor the management, storage, creation, modification, and deployment of\nJBoss rules and BPMN2-compliant business processes.\n\nThis release of Red Hat JBoss BPM Suite 6.1.5 serves as a replacement for\nRed Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements,\nwhich are documented in the README.txt file included with the patch files.\n\nThe following security issue is also fixed with this release:\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nAll users of Red Hat JBoss BPM Suite 6.1.2 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.1.5.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0042", "url": "https://access.redhat.com/errata/RHSA-2016:0042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.1.0" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0042.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.5 update", "tracking": { "current_release_date": "2025-09-10T14:10:17+00:00", "generator": { "date": "2025-09-10T14:10:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2016:0042", "initial_release_date": "2016-01-14T18:34:44+00:00", "revision_history": [ { "date": "2016-01-14T18:34:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:38:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:10:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BPMS 6.1", "product": { "name": "Red Hat JBoss BPMS 6.1", "product_id": "Red Hat JBoss BPMS 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_bpms:6.1" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-14T18:34:44+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0042" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" } ] }
RHSA-2016:0041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BRMS 6.1.5, which fixes one security issue, several bugs,\nand adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BRMS is a business-rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.1.5 serves as a replacement for Red\nHat JBoss BRMS 6.1.2, and includes bug fixes and enhancements that are\ndocumented in the README.txt file included with the patch files.\n\nThe following security issue is also fixed with this release:\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nAll users of Red Hat JBoss BRMS 6.1.2 as provided from the Red Hat Customer\nPortal are advised to upgrade to Red Hat JBoss BRMS 6.1.5.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0041", "url": "https://access.redhat.com/errata/RHSA-2016:0041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.1.0" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0041.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.5 update", "tracking": { "current_release_date": "2025-09-10T14:10:17+00:00", "generator": { "date": "2025-09-10T14:10:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2016:0041", "initial_release_date": "2016-01-14T18:34:49+00:00", "revision_history": [ { "date": "2016-01-14T18:34:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:37:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:10:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BRMS 6.1", "product": { "name": "Red Hat JBoss BRMS 6.1", "product_id": "Red Hat JBoss BRMS 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_brms:6.1" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-14T18:34:49+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so forth.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0041" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" } ] }
rhsa-2015_2559
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BRMS 6.2.0, which fixes three security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BRMS is a business rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.2.0 serves as a replacement for Red\nHat JBoss BRMS 6.1.2, and includes bug fixes and enhancements. Refer to the\nRed Hat JBoss BRMS 6.2.0 Release Notes for information on the most\nsignificant of these changes. The Release Notes are available at\nhttps://access.redhat.com/documentation/en/red-hat-jboss-brms/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nIt was found that jsoup did not properly validate user-supplied HTML\ncontent; certain HTML snippets could get past the validator without being\ndetected as unsafe. A remote attacker could use a specially crafted HTML\nsnippet to execute arbitrary web script in the user\u0027s browser.\n(CVE-2015-6748)\n\nAll users of Red Hat JBoss BRMS 6.1.2 as provided from the Red Hat Customer\nPortal are advised to upgrade to Red Hat JBoss BRMS 6.2.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2559", "url": "https://access.redhat.com/errata/RHSA-2015:2559" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-brms/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-brms/" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2559.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update", "tracking": { "current_release_date": "2024-12-15T18:42:30+00:00", "generator": { "date": "2024-12-15T18:42:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2015:2559", "initial_release_date": "2015-12-07T20:46:42+00:00", "revision_history": [ { "date": "2015-12-07T20:46:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:35:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:42:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BRMS 6.2", "product": { "name": "Red Hat JBoss BRMS 6.2", "product_id": "Red Hat JBoss BRMS 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_brms:6.2" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" }, { "cve": "CVE-2015-6748", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1258310" } ], "notes": [ { "category": "description", "text": "It was found that jsoup did not properly validate user-supplied HTML content; certain HTML snippets could get past the validator without being detected as unsafe. A remote attacker could use a specially crafted HTML snippet to execute arbitrary web script in the user\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: XSS vulnerability related to incomplete tags at EOF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6748" }, { "category": "external", "summary": "RHBZ#1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6748", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748" } ], "release_date": "2015-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: XSS vulnerability related to incomplete tags at EOF" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
RHSA-2015:2560
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BPM Suite 6.2.0, which fixes three security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BPM Suite is a business rules and processes management system\nfor the management, storage, creation, modification, and deployment of\nJBoss rules and BPMN2-compliant business processes.\n\nThis release of Red Hat JBoss BPM Suite 6.2.0 serves as a replacement for\nRed Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements.\nRefer to the Red Hat JBoss BPM Suite 6.2.0 Release Notes for information on\nthe most significant of these changes. The Release Notes are available at\nhttps://access.redhat.com/documentation/en/red-hat-jboss-brms/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nIt was found that jsoup did not properly validate user-supplied HTML\ncontent; certain HTML snippets could get past the validator without being\ndetected as unsafe. A remote attacker could use a specially crafted HTML\nsnippet to execute arbitrary web script in the user\u0027s browser.\n(CVE-2015-6748)\n\nAll users of Red Hat JBoss BPM Suite 6.1.2 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.2.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2560", "url": "https://access.redhat.com/errata/RHSA-2015:2560" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-bpm-suite/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-bpm-suite/" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2560.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.2.0 update", "tracking": { "current_release_date": "2025-09-10T14:09:44+00:00", "generator": { "date": "2025-09-10T14:09:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:2560", "initial_release_date": "2015-12-07T20:46:36+00:00", "revision_history": [ { "date": "2015-12-07T20:46:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:09:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BPMS 6.2", "product": { "name": "Red Hat JBoss BPMS 6.2", "product_id": "Red Hat JBoss BPMS 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_bpms:6.2" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" }, { "cve": "CVE-2015-6748", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1258310" } ], "notes": [ { "category": "description", "text": "It was found that jsoup did not properly validate user-supplied HTML content; certain HTML snippets could get past the validator without being detected as unsafe. A remote attacker could use a specially crafted HTML snippet to execute arbitrary web script in the user\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: XSS vulnerability related to incomplete tags at EOF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6748" }, { "category": "external", "summary": "RHBZ#1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6748", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748" } ], "release_date": "2015-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: XSS vulnerability related to incomplete tags at EOF" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2016_0041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BRMS 6.1.5, which fixes one security issue, several bugs,\nand adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BRMS is a business-rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.1.5 serves as a replacement for Red\nHat JBoss BRMS 6.1.2, and includes bug fixes and enhancements that are\ndocumented in the README.txt file included with the patch files.\n\nThe following security issue is also fixed with this release:\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nAll users of Red Hat JBoss BRMS 6.1.2 as provided from the Red Hat Customer\nPortal are advised to upgrade to Red Hat JBoss BRMS 6.1.5.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0041", "url": "https://access.redhat.com/errata/RHSA-2016:0041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.1.0" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0041.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.5 update", "tracking": { "current_release_date": "2024-11-22T09:34:35+00:00", "generator": { "date": "2024-11-22T09:34:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0041", "initial_release_date": "2016-01-14T18:34:49+00:00", "revision_history": [ { "date": "2016-01-14T18:34:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:37:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:34:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BRMS 6.1", "product": { "name": "Red Hat JBoss BRMS 6.1", "product_id": "Red Hat JBoss BRMS 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_brms:6.1" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-14T18:34:49+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so forth.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0041" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" } ] }
rhsa-2016_0042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BPM Suite 6.1.5, which fixes one security issue, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BPM Suite is a business rules and processes management system\nfor the management, storage, creation, modification, and deployment of\nJBoss rules and BPMN2-compliant business processes.\n\nThis release of Red Hat JBoss BPM Suite 6.1.5 serves as a replacement for\nRed Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements,\nwhich are documented in the README.txt file included with the patch files.\n\nThe following security issue is also fixed with this release:\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nAll users of Red Hat JBoss BPM Suite 6.1.2 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.1.5.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0042", "url": "https://access.redhat.com/errata/RHSA-2016:0042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.1.0" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0042.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.5 update", "tracking": { "current_release_date": "2024-11-22T09:34:40+00:00", "generator": { "date": "2024-11-22T09:34:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0042", "initial_release_date": "2016-01-14T18:34:44+00:00", "revision_history": [ { "date": "2016-01-14T18:34:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:38:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:34:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BPMS 6.1", "product": { "name": "Red Hat JBoss BPMS 6.1", "product_id": "Red Hat JBoss BPMS 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_bpms:6.1" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-14T18:34:44+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0042" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" } ] }
rhsa-2016:0041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BRMS 6.1.5, which fixes one security issue, several bugs,\nand adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BRMS is a business-rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.1.5 serves as a replacement for Red\nHat JBoss BRMS 6.1.2, and includes bug fixes and enhancements that are\ndocumented in the README.txt file included with the patch files.\n\nThe following security issue is also fixed with this release:\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nAll users of Red Hat JBoss BRMS 6.1.2 as provided from the Red Hat Customer\nPortal are advised to upgrade to Red Hat JBoss BRMS 6.1.5.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0041", "url": "https://access.redhat.com/errata/RHSA-2016:0041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.1.0" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0041.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.5 update", "tracking": { "current_release_date": "2025-09-10T14:10:17+00:00", "generator": { "date": "2025-09-10T14:10:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2016:0041", "initial_release_date": "2016-01-14T18:34:49+00:00", "revision_history": [ { "date": "2016-01-14T18:34:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:37:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:10:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BRMS 6.1", "product": { "name": "Red Hat JBoss BRMS 6.1", "product_id": "Red Hat JBoss BRMS 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_brms:6.1" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-14T18:34:49+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so forth.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0041" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" } ] }
rhsa-2015:2560
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BPM Suite 6.2.0, which fixes three security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BPM Suite is a business rules and processes management system\nfor the management, storage, creation, modification, and deployment of\nJBoss rules and BPMN2-compliant business processes.\n\nThis release of Red Hat JBoss BPM Suite 6.2.0 serves as a replacement for\nRed Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements.\nRefer to the Red Hat JBoss BPM Suite 6.2.0 Release Notes for information on\nthe most significant of these changes. The Release Notes are available at\nhttps://access.redhat.com/documentation/en/red-hat-jboss-brms/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nIt was found that jsoup did not properly validate user-supplied HTML\ncontent; certain HTML snippets could get past the validator without being\ndetected as unsafe. A remote attacker could use a specially crafted HTML\nsnippet to execute arbitrary web script in the user\u0027s browser.\n(CVE-2015-6748)\n\nAll users of Red Hat JBoss BPM Suite 6.1.2 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.2.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2560", "url": "https://access.redhat.com/errata/RHSA-2015:2560" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-bpm-suite/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-bpm-suite/" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2560.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.2.0 update", "tracking": { "current_release_date": "2025-09-10T14:09:44+00:00", "generator": { "date": "2025-09-10T14:09:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:2560", "initial_release_date": "2015-12-07T20:46:36+00:00", "revision_history": [ { "date": "2015-12-07T20:46:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:09:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BPMS 6.2", "product": { "name": "Red Hat JBoss BPMS 6.2", "product_id": "Red Hat JBoss BPMS 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_bpms:6.2" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" }, { "cve": "CVE-2015-6748", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1258310" } ], "notes": [ { "category": "description", "text": "It was found that jsoup did not properly validate user-supplied HTML content; certain HTML snippets could get past the validator without being detected as unsafe. A remote attacker could use a specially crafted HTML snippet to execute arbitrary web script in the user\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: XSS vulnerability related to incomplete tags at EOF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6748" }, { "category": "external", "summary": "RHBZ#1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6748", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748" } ], "release_date": "2015-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: XSS vulnerability related to incomplete tags at EOF" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
RHSA-2015:2559
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BRMS 6.2.0, which fixes three security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BRMS is a business rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.2.0 serves as a replacement for Red\nHat JBoss BRMS 6.1.2, and includes bug fixes and enhancements. Refer to the\nRed Hat JBoss BRMS 6.2.0 Release Notes for information on the most\nsignificant of these changes. The Release Notes are available at\nhttps://access.redhat.com/documentation/en/red-hat-jboss-brms/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nIt was found that jsoup did not properly validate user-supplied HTML\ncontent; certain HTML snippets could get past the validator without being\ndetected as unsafe. A remote attacker could use a specially crafted HTML\nsnippet to execute arbitrary web script in the user\u0027s browser.\n(CVE-2015-6748)\n\nAll users of Red Hat JBoss BRMS 6.1.2 as provided from the Red Hat Customer\nPortal are advised to upgrade to Red Hat JBoss BRMS 6.2.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2559", "url": "https://access.redhat.com/errata/RHSA-2015:2559" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-brms/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-brms/" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2559.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update", "tracking": { "current_release_date": "2025-09-10T14:09:44+00:00", "generator": { "date": "2025-09-10T14:09:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:2559", "initial_release_date": "2015-12-07T20:46:42+00:00", "revision_history": [ { "date": "2015-12-07T20:46:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:35:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:09:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BRMS 6.2", "product": { "name": "Red Hat JBoss BRMS 6.2", "product_id": "Red Hat JBoss BRMS 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_brms:6.2" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" }, { "cve": "CVE-2015-6748", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1258310" } ], "notes": [ { "category": "description", "text": "It was found that jsoup did not properly validate user-supplied HTML content; certain HTML snippets could get past the validator without being detected as unsafe. A remote attacker could use a specially crafted HTML snippet to execute arbitrary web script in the user\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: XSS vulnerability related to incomplete tags at EOF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6748" }, { "category": "external", "summary": "RHBZ#1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6748", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748" } ], "release_date": "2015-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: XSS vulnerability related to incomplete tags at EOF" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2560
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BPM Suite 6.2.0, which fixes three security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BPM Suite is a business rules and processes management system\nfor the management, storage, creation, modification, and deployment of\nJBoss rules and BPMN2-compliant business processes.\n\nThis release of Red Hat JBoss BPM Suite 6.2.0 serves as a replacement for\nRed Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements.\nRefer to the Red Hat JBoss BPM Suite 6.2.0 Release Notes for information on\nthe most significant of these changes. The Release Notes are available at\nhttps://access.redhat.com/documentation/en/red-hat-jboss-brms/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nIt was found that jsoup did not properly validate user-supplied HTML\ncontent; certain HTML snippets could get past the validator without being\ndetected as unsafe. A remote attacker could use a specially crafted HTML\nsnippet to execute arbitrary web script in the user\u0027s browser.\n(CVE-2015-6748)\n\nAll users of Red Hat JBoss BPM Suite 6.1.2 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.2.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2560", "url": "https://access.redhat.com/errata/RHSA-2015:2560" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-bpm-suite/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-bpm-suite/" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2560.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.2.0 update", "tracking": { "current_release_date": "2024-12-15T18:42:34+00:00", "generator": { "date": "2024-12-15T18:42:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2015:2560", "initial_release_date": "2015-12-07T20:46:36+00:00", "revision_history": [ { "date": "2015-12-07T20:46:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:42:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BPMS 6.2", "product": { "name": "Red Hat JBoss BPMS 6.2", "product_id": "Red Hat JBoss BPMS 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_bpms:6.2" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" }, { "cve": "CVE-2015-6748", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1258310" } ], "notes": [ { "category": "description", "text": "It was found that jsoup did not properly validate user-supplied HTML content; certain HTML snippets could get past the validator without being detected as unsafe. A remote attacker could use a specially crafted HTML snippet to execute arbitrary web script in the user\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: XSS vulnerability related to incomplete tags at EOF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6748" }, { "category": "external", "summary": "RHBZ#1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6748", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748" } ], "release_date": "2015-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: XSS vulnerability related to incomplete tags at EOF" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015:2559
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BRMS 6.2.0, which fixes three security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BRMS is a business rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.2.0 serves as a replacement for Red\nHat JBoss BRMS 6.1.2, and includes bug fixes and enhancements. Refer to the\nRed Hat JBoss BRMS 6.2.0 Release Notes for information on the most\nsignificant of these changes. The Release Notes are available at\nhttps://access.redhat.com/documentation/en/red-hat-jboss-brms/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nIt was found that jsoup did not properly validate user-supplied HTML\ncontent; certain HTML snippets could get past the validator without being\ndetected as unsafe. A remote attacker could use a specially crafted HTML\nsnippet to execute arbitrary web script in the user\u0027s browser.\n(CVE-2015-6748)\n\nAll users of Red Hat JBoss BRMS 6.1.2 as provided from the Red Hat Customer\nPortal are advised to upgrade to Red Hat JBoss BRMS 6.2.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2559", "url": "https://access.redhat.com/errata/RHSA-2015:2559" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-brms/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-brms/" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2559.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update", "tracking": { "current_release_date": "2025-09-10T14:09:44+00:00", "generator": { "date": "2025-09-10T14:09:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:2559", "initial_release_date": "2015-12-07T20:46:42+00:00", "revision_history": [ { "date": "2015-12-07T20:46:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:35:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:09:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BRMS 6.2", "product": { "name": "Red Hat JBoss BRMS 6.2", "product_id": "Red Hat JBoss BRMS 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_brms:6.2" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" }, { "cve": "CVE-2015-6748", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1258310" } ], "notes": [ { "category": "description", "text": "It was found that jsoup did not properly validate user-supplied HTML content; certain HTML snippets could get past the validator without being detected as unsafe. A remote attacker could use a specially crafted HTML snippet to execute arbitrary web script in the user\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: XSS vulnerability related to incomplete tags at EOF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6748" }, { "category": "external", "summary": "RHBZ#1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6748", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748" } ], "release_date": "2015-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: XSS vulnerability related to incomplete tags at EOF" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
ghsa-wfw6-mmmp-87xm
Vulnerability from github
XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.xmlgraphics:batik" }, "ranges": [ { "events": [ { "introduced": "1.0" }, { "fixed": "1.8" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2015-0250" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": true, "github_reviewed_at": "2022-07-06T20:29:14Z", "nvd_published_at": "2015-03-24T17:59:00Z", "severity": "MODERATE" }, "details": "XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.", "id": "GHSA-wfw6-mmmp-87xm", "modified": "2022-07-06T20:29:14Z", "published": "2022-05-17T00:28:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "type": "WEB", "url": "http://advisories.mageia.org/MGASA-2015-0138.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0041.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0042.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2015/Mar/142" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3205" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1032781" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2548-1" }, { "type": "WEB", "url": "http://xmlgraphics.apache.org/security.html" } ], "schema_version": "1.4.0", "severity": [], "summary": "Improper Input Validation in Apache Batik" }
fkie_cve-2015-0250
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
apache | batik | * | |
redhat | jboss_enterprise_brms_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:batik:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DC0508D-B46A-4282-83BD-5CEBDB76B7FB", "versionEndIncluding": "1.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_brms_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "494221AE-DB44-4CBA-B4F2-77769667B539", "versionEndIncluding": "6.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file." }, { "lang": "es", "value": "Vulnerabilidad de entidad externa XML (XXE) en los gr\u00e1ficos vectoriales redimensionables en las clases de conversi\u00f3n (1) PNG y (2) JPG en Apache Batik 1.x anterior a 1.8 permite a atacantes remotos leer ficheros arbitrarios o causar una denegaci\u00f3n de servicio a trav\u00e9s de un fichero de gr\u00e1ficos vectoriales redimensionables manipulado." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/611.html\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e", "id": "CVE-2015-0250", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-03-24T17:59:00.070", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2015-0138.html" }, { "source": "secalert@redhat.com", "url": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0041.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0042.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/142" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3205" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1032781" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.ubuntu.com/usn/USN-2548-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://xmlgraphics.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0138.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.ubuntu.com/usn/USN-2548-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://xmlgraphics.apache.org/security.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
wid-sec-w-2023-0027
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Tivoli Network Manager ist eine Netzanalysesoftware f\u00fcr das Management komplexer Netze. Diese Software erfasst und verteilt Layer-2- und Layer-3-Netzdaten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in IBM Tivoli Network Manager ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0027 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0027.json" }, { "category": "self", "summary": "WID-SEC-2023-0027 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0027" }, { "category": "external", "summary": "IBM Security Bulletin 6958056 vom 2023-02-24", "url": "https://www.ibm.com/support/pages/node/6958056" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852633" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852613" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852611" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852609" } ], "source_lang": "en-US", "title": "IBM Tivoli Network Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-02-23T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:40:51.947+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0027", "initial_release_date": "2023-01-04T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-04T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-02-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Tivoli Network Manager \u003c= 4.2.0.15", "product": { "name": "IBM Tivoli Network Manager \u003c= 4.2.0.15", "product_id": "T024051", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:4.2.0.15" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager 4.2.0", "product": { "name": "IBM Tivoli Network Manager 4.2.0", "product_id": "T025751", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:4.2.0" } } } ], "category": "product_name", "name": "Tivoli Network Manager" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2022-2047" }, { "cve": "CVE-2021-41033", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2021-41033" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-11987", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2020-11987" }, { "cve": "CVE-2019-17566", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2019-17566" }, { "cve": "CVE-2018-8013", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2018-8013" }, { "cve": "CVE-2017-5662", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2017-5662" }, { "cve": "CVE-2016-3506", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2016-3506" }, { "cve": "CVE-2015-0250", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2015-0250" }, { "cve": "CVE-2009-4521", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2009-4521" }, { "cve": "CVE-2009-4269", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2009-4269" }, { "cve": "CVE-2007-2378", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2007-2378" } ] }
WID-SEC-W-2023-0027
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Tivoli Network Manager ist eine Netzanalysesoftware f\u00fcr das Management komplexer Netze. Diese Software erfasst und verteilt Layer-2- und Layer-3-Netzdaten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in IBM Tivoli Network Manager ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0027 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0027.json" }, { "category": "self", "summary": "WID-SEC-2023-0027 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0027" }, { "category": "external", "summary": "IBM Security Bulletin 6958056 vom 2023-02-24", "url": "https://www.ibm.com/support/pages/node/6958056" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852633" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852613" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852611" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852609" } ], "source_lang": "en-US", "title": "IBM Tivoli Network Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-02-23T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:40:51.947+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0027", "initial_release_date": "2023-01-04T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-04T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-02-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Tivoli Network Manager \u003c= 4.2.0.15", "product": { "name": "IBM Tivoli Network Manager \u003c= 4.2.0.15", "product_id": "T024051", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:4.2.0.15" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager 4.2.0", "product": { "name": "IBM Tivoli Network Manager 4.2.0", "product_id": "T025751", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:4.2.0" } } } ], "category": "product_name", "name": "Tivoli Network Manager" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2022-2047" }, { "cve": "CVE-2021-41033", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2021-41033" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-11987", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2020-11987" }, { "cve": "CVE-2019-17566", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2019-17566" }, { "cve": "CVE-2018-8013", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2018-8013" }, { "cve": "CVE-2017-5662", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2017-5662" }, { "cve": "CVE-2016-3506", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2016-3506" }, { "cve": "CVE-2015-0250", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2015-0250" }, { "cve": "CVE-2009-4521", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2009-4521" }, { "cve": "CVE-2009-4269", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2009-4269" }, { "cve": "CVE-2007-2378", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen in verschiedenen Komponenten von Drittanbietern wie Google Web Toolkit, Eclipse BIRT, Apache Batik, Apache Derby, Eclipse Equinox, FasterXML jackson-databind, Eclipse Jetty, Netty und JDBC. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025751" ], "last_affected": [ "T024051" ] }, "release_date": "2023-01-04T23:00:00.000+00:00", "title": "CVE-2007-2378" } ] }
gsd-2015-0250
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-0250", "description": "XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.", "id": "GSD-2015-0250", "references": [ "https://www.suse.com/security/cve/CVE-2015-0250.html", "https://www.debian.org/security/2015/dsa-3205", "https://access.redhat.com/errata/RHSA-2016:0042", "https://access.redhat.com/errata/RHSA-2016:0041", "https://access.redhat.com/errata/RHSA-2015:2560", "https://access.redhat.com/errata/RHSA-2015:2559", "https://ubuntu.com/security/CVE-2015-0250", "https://advisories.mageia.org/CVE-2015-0250.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-0250" ], "details": "XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.", "id": "GSD-2015-0250", "modified": "2023-12-13T01:19:58.711377Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0250", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2548-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2548-1" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" }, { "name": "MDVSA-2015:203", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203" }, { "name": "DSA-3205", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3205" }, { "name": "1032781", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032781" }, { "name": "http://advisories.mageia.org/MGASA-2015-0138.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0138.html" }, { "name": "20150322 [CVE-2015-0250] Apache Batik Information Disclosure Vulnerability (XXE Injection)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Mar/142" }, { "name": "RHSA-2016:0042", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0042.html" }, { "name": "http://xmlgraphics.apache.org/security.html", "refsource": "CONFIRM", "url": "http://xmlgraphics.apache.org/security.html" }, { "name": "RHSA-2016:0041", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0041.html" }, { "name": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "(,1.7]", "affected_versions": "All versions up to 1.7", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2017-11-03", "description": "XML external entity (XXE) vulnerability in the SVG to PNG and JPG conversion classes in Apache Batik allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.", "fixed_versions": [ "1.8" ], "identifier": "CVE-2015-0250", "identifiers": [ "CVE-2015-0250" ], "not_impacted": "All versions after 1.7", "package_slug": "maven/batik/batik-transcoder", "pubdate": "2015-03-24", "solution": "Upgrade to version 1.8 or above.", "title": "Improper Restriction of XML External Entity Reference", "urls": [ "http://www.insinuator.net/2015/03/xxe-injection-in-apache-batik-library-cve-2015-0250/", "https://www.ernw.de/download/apache_batik_xxe_advisory.txt", "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0250" ], "uuid": "56c52596-8201-4adc-908a-e5513045f936" }, { "affected_range": "[1.0,1.8)", "affected_versions": "All versions starting from 1.0 before 1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2023-06-14", "description": "XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.", "fixed_versions": [ "1.8" ], "identifier": "CVE-2015-0250", "identifiers": [ "GHSA-wfw6-mmmp-87xm", "CVE-2015-0250" ], "not_impacted": "All versions before 1.0, all versions starting from 1.8", "package_slug": "maven/org.apache.xmlgraphics/batik-dom", "pubdate": "2022-05-17", "solution": "Upgrade to version 1.8 or above.", "title": "Improper Input Validation in Apache Batik", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "http://advisories.mageia.org/MGASA-2015-0138.html", "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html", "http://rhn.redhat.com/errata/RHSA-2016-0041.html", "http://rhn.redhat.com/errata/RHSA-2016-0042.html", "http://seclists.org/fulldisclosure/2015/Mar/142", "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", "http://www.debian.org/security/2015/dsa-3205", "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203", "http://www.securitytracker.com/id/1032781", "http://www.ubuntu.com/usn/USN-2548-1", "http://xmlgraphics.apache.org/security.html", "https://github.com/advisories/GHSA-wfw6-mmmp-87xm" ], "uuid": "0f8dfc0a-aa59-4ee9-a398-f44b93a3baa2" }, { "affected_range": "(,1.7]", "affected_versions": "All versions up to 1.7", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2017-11-03", "description": "XML external entity (XXE) vulnerability in the SVG to PNG and JPG conversion classes in this package allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.", "fixed_versions": [ "1.8" ], "identifier": "CVE-2015-0250", "identifiers": [ "CVE-2015-0250" ], "not_impacted": "All versions after 1.7", "package_slug": "maven/org.apache.xmlgraphics/batik-transcoder", "pubdate": "2015-03-24", "solution": "Upgrade to version 1.8 or above.", "title": "XML external entity vulnerability", "urls": [ "http://www.insinuator.net/2015/03/xxe-injection-in-apache-batik-library-cve-2015-0250/", "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0250", "https://www.ernw.de/download/apache_batik_xxe_advisory.txt" ], "uuid": "cbf80902-ee3a-45e7-814d-9b5ab58cd2a4" }, { "affected_range": "(,0)", "affected_versions": "All versions starting from 1.0 before 1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2023-06-14", "description": "This advisory has been moved to `batik-dom`.", "fixed_versions": [ "1.8" ], "identifier": "CVE-2015-0250", "identifiers": [ "GHSA-wfw6-mmmp-87xm", "CVE-2015-0250" ], "not_impacted": "All versions before 1.0, all versions starting from 1.8", "package_slug": "maven/org.apache.xmlgraphics/batik", "pubdate": "2022-05-17", "solution": "Upgrade to version 1.8 or above.", "title": "Improper Input Validation in Apache Batik", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "http://advisories.mageia.org/MGASA-2015-0138.html", "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html", "http://rhn.redhat.com/errata/RHSA-2016-0041.html", "http://rhn.redhat.com/errata/RHSA-2016-0042.html", "http://seclists.org/fulldisclosure/2015/Mar/142", "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", "http://www.debian.org/security/2015/dsa-3205", "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203", "http://www.securitytracker.com/id/1032781", "http://www.ubuntu.com/usn/USN-2548-1", "http://xmlgraphics.apache.org/security.html", "https://github.com/advisories/GHSA-wfw6-mmmp-87xm" ], "uuid": "8c5beacc-1624-48d3-9d7f-b876a22f99f8" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:batik:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_brms_platform:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.1.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0250" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "20150322 [CVE-2015-0250] Apache Batik Information Disclosure Vulnerability (XXE Injection)", "refsource": "FULLDISC", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/142" }, { "name": "http://xmlgraphics.apache.org/security.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://xmlgraphics.apache.org/security.html" }, { "name": "USN-2548-1", "refsource": "UBUNTU", "tags": [ "Patch" ], "url": "http://www.ubuntu.com/usn/USN-2548-1" }, { "name": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html" }, { "name": "MDVSA-2015:203", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203" }, { "name": "http://advisories.mageia.org/MGASA-2015-0138.html", "refsource": "CONFIRM", "tags": [], "url": "http://advisories.mageia.org/MGASA-2015-0138.html" }, { "name": "RHSA-2016:0041", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0041.html" }, { "name": "RHSA-2016:0042", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0042.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" }, { "name": "1032781", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1032781" }, { "name": "DSA-3205", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2015/dsa-3205" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-11-04T01:29Z", "publishedDate": "2015-03-24T17:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.