rhsa-2017_3458
Vulnerability from csaf_redhat
Published
2017-12-13 18:26
Modified
2024-12-08 10:56
Summary
Red Hat Security Advisory: eap7-jboss-ec2-eap security update

Notes

Topic
An update for eap7-jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The eap7-jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the eap7-jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 7.1. Refer to the JBoss Enterprise Application Platform 7.1 Release Notes, linked to in the References section, for information on the most significant bug fixes and enhancements included in this release. Security Fix(es): * A Denial of Service can be caused when a long request is sent to EAP 7. (CVE-2016-7046) * The jboss init script unsafe file handling resulting in local privilege escalation. (CVE-2016-8656) * A deserialization vulnerability via readValue method of ObjectMapper which allows arbitrary code execution. (CVE-2017-7525) * JMSObjectMessage deserializes potentially malicious objects allowing Remote Code Execution. (CVE-2016-4978) * Undertow is vulnerable to the injection of arbitrary HTTP headers, and also response splitting. (CVE-2016-4993) * The domain controller will not propagate its administrative RBAC configuration to some slaves leading to escalate their privileges. (CVE-2016-5406) * Internal IP address disclosed on redirect when request header Host field is not set. (CVE-2016-6311) * Potential EAP resource starvation DOS attack via GET requests for server log files. (CVE-2016-8627) * Inefficient Header Cache could cause denial of service. (CVE-2016-9589) * The log file viewer allows arbitrary file read to authenticated user via path traversal. (CVE-2017-2595) * HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests. (CVE-2017-2666) * Websocket non clean close can cause IO thread to get stuck in a loop. (CVE-2017-2670) * Privilege escalation with security manager's reflective permissions when granted to Hibernate Validator. (CVE-2017-7536) * Potential http request smuggling as Undertow parses the http headers with unusual whitespaces. (CVE-2017-7559) * Properties based files of the management and the application realm are world readable allowing access to users and roles information to all the users logged in to the system. (CVE-2017-12167) * RBAC configuration allows users with a Monitor role to view the sensitive information. (CVE-2016-7061) * Improper whitespace parsing leading to potential HTTP request smuggling. (CVE-2017-12165) Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525; Calum Hutton (NCC Group) and Mikhail Egorov (Odin) for reporting CVE-2016-4993; Luca Bueti for reporting CVE-2016-6311; Gabriel Lavoie (Halogen Software) for reporting CVE-2016-9589; and Gregory Ramsperger and Ryan Moak for reporting CVE-2017-2670. The CVE-2016-5406 issue was discovered by Tomaz Cerar (Red Hat); the CVE-2016-8627 issue was discovered by Darran Lofthouse (Red Hat) and Brian Stansberry (Red Hat); the CVE-2017-2666 issue was discovered by Radim Hatlapatka (Red Hat); the CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat); the CVE-2017-7559 and CVE-2017-12165 issues were discovered by Stuart Douglas (Red Hat); and the CVE-2017-12167 issue was discovered by Brian Stansberry (Red Hat) and Jeremy Choi (Red Hat). Upstream acknowledges WildFly as the original reporter of CVE-2016-6311.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for eap7-jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The eap7-jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2).\n\nWith this update, the eap7-jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 7.1.\n\nRefer to the JBoss Enterprise Application Platform 7.1 Release Notes, linked to in the References section, for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* A Denial of Service can be caused when a long request is sent to EAP 7. (CVE-2016-7046)\n\n* The jboss init script unsafe file handling resulting in local privilege escalation. (CVE-2016-8656)\n\n* A deserialization vulnerability via readValue method of ObjectMapper which allows arbitrary code execution. (CVE-2017-7525) \n\n* JMSObjectMessage deserializes potentially malicious objects allowing Remote Code Execution. (CVE-2016-4978)\n\n* Undertow is vulnerable to the injection of arbitrary HTTP headers, and also response splitting. (CVE-2016-4993)\n\n* The domain controller will not propagate its administrative RBAC configuration to some slaves leading to escalate their privileges. (CVE-2016-5406)\n\n* Internal IP address disclosed on redirect when request header Host field is not set. (CVE-2016-6311)\n\n* Potential EAP resource starvation DOS attack via GET requests for server log files. (CVE-2016-8627)\n\n* Inefficient Header Cache could cause denial of service. (CVE-2016-9589)\n\n* The log file viewer allows arbitrary file read to authenticated user via path traversal. (CVE-2017-2595)\n\n* HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests. (CVE-2017-2666)\n\n* Websocket non clean close can cause IO thread to get stuck in a loop. (CVE-2017-2670)\n\n* Privilege escalation with security manager\u0027s reflective permissions when granted to Hibernate Validator. (CVE-2017-7536)\n\n* Potential http request smuggling as Undertow parses the http headers with unusual whitespaces. (CVE-2017-7559)\n\n* Properties based files of the management and the application realm are world readable allowing access to users and roles information to all the users logged in to the system. (CVE-2017-12167)\n\n* RBAC configuration allows users with a Monitor role to view the sensitive information. (CVE-2016-7061)\n\n* Improper whitespace parsing leading to potential HTTP request smuggling. (CVE-2017-12165)\n\nRed Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525; Calum Hutton (NCC Group) and Mikhail Egorov (Odin) for reporting CVE-2016-4993; Luca Bueti for reporting CVE-2016-6311; Gabriel Lavoie (Halogen Software) for reporting CVE-2016-9589; and Gregory Ramsperger and Ryan Moak for reporting CVE-2017-2670. The CVE-2016-5406 issue was discovered by Tomaz Cerar (Red Hat); the CVE-2016-8627 issue was discovered by Darran Lofthouse (Red Hat) and Brian Stansberry (Red Hat); the CVE-2017-2666 issue was discovered by Radim Hatlapatka (Red Hat); the CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat); the CVE-2017-7559 and CVE-2017-12165 issues were discovered by Stuart Douglas (Red Hat); and the CVE-2017-12167 issue was discovered by Brian Stansberry (Red Hat) and Jeremy Choi (Red Hat). Upstream acknowledges WildFly as the original reporter of CVE-2016-6311.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3458",
        "url": "https://access.redhat.com/errata/RHSA-2017:3458"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/",
        "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/"
      },
      {
        "category": "external",
        "summary": "1344321",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344321"
      },
      {
        "category": "external",
        "summary": "1359014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359014"
      },
      {
        "category": "external",
        "summary": "1362735",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362735"
      },
      {
        "category": "external",
        "summary": "1376646",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376646"
      },
      {
        "category": "external",
        "summary": "1379207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379207"
      },
      {
        "category": "external",
        "summary": "1380852",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852"
      },
      {
        "category": "external",
        "summary": "1388240",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240"
      },
      {
        "category": "external",
        "summary": "1400344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344"
      },
      {
        "category": "external",
        "summary": "1404782",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404782"
      },
      {
        "category": "external",
        "summary": "1413028",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413028"
      },
      {
        "category": "external",
        "summary": "1436163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436163"
      },
      {
        "category": "external",
        "summary": "1438885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438885"
      },
      {
        "category": "external",
        "summary": "1462702",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462702"
      },
      {
        "category": "external",
        "summary": "1465573",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465573"
      },
      {
        "category": "external",
        "summary": "1481665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481665"
      },
      {
        "category": "external",
        "summary": "1490301",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490301"
      },
      {
        "category": "external",
        "summary": "1491612",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491612"
      },
      {
        "category": "external",
        "summary": "JBEAP-5324",
        "url": "https://issues.redhat.com/browse/JBEAP-5324"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3458.json"
      }
    ],
    "title": "Red Hat Security Advisory: eap7-jboss-ec2-eap security update",
    "tracking": {
      "current_release_date": "2024-12-08T10:56:55+00:00",
      "generator": {
        "date": "2024-12-08T10:56:55+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.3"
        }
      },
      "id": "RHSA-2017:3458",
      "initial_release_date": "2017-12-13T18:26:13+00:00",
      "revision_history": [
        {
          "date": "2017-12-13T18:26:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-12-13T18:26:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-08T10:56:55+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Server",
                  "product_id": "7Server-JBEAP-7.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Server",
                  "product_id": "6Server-JBEAP-7.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Enterprise Application Platform"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
                "product": {
                  "name": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
                  "product_id": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jboss-ec2-eap-samples@7.1.0-5.GA_redhat_5.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
                "product": {
                  "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
                  "product_id": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jboss-ec2-eap@7.1.0-5.GA_redhat_5.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
                "product": {
                  "name": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
                  "product_id": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jboss-ec2-eap-samples@7.1.0-5.GA_redhat_5.ep7.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
                "product": {
                  "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
                  "product_id": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jboss-ec2-eap@7.1.0-5.GA_redhat_5.ep7.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
                "product": {
                  "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
                  "product_id": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jboss-ec2-eap@7.1.0-5.GA_redhat_5.ep7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
                "product": {
                  "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
                  "product_id": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jboss-ec2-eap@7.1.0-5.GA_redhat_5.ep7.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch"
        },
        "product_reference": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
        "relates_to_product_reference": "6Server-JBEAP-7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src"
        },
        "product_reference": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch"
        },
        "product_reference": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
        "relates_to_product_reference": "6Server-JBEAP-7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        },
        "product_reference": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src"
        },
        "product_reference": "eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        },
        "product_reference": "eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-4978",
      "discovery_date": "2016-09-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1379207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that use of a JMS ObjectMessage does not safely handle user supplied data when deserializing objects. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Artemis: Deserialization of untrusted input vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-4978"
        },
        {
          "category": "external",
          "summary": "RHBZ#1379207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4978",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-4978"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4978",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4978"
        }
      ],
      "release_date": "2016-09-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Artemis: Deserialization of untrusted input vulnerability"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Calum Hutton"
          ],
          "organization": "NCC Group"
        },
        {
          "names": [
            "Mikhail Egorov"
          ],
          "organization": "Odin"
        }
      ],
      "cve": "CVE-2016-4993",
      "cwe": {
        "id": "CWE-113",
        "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
      },
      "discovery_date": "2016-06-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1344321"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was reported that EAP 7 Application Server/Undertow web server is vulnerable to the injection of arbitrary HTTP headers, and also response splitting, due to insufficient sanitization and validation of user input before the input is used as part of an HTTP header value.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "eap: HTTP header injection / response splitting",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-4993"
        },
        {
          "category": "external",
          "summary": "RHBZ#1344321",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344321"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4993",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-4993"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4993",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4993"
        }
      ],
      "release_date": "2016-09-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "eap: HTTP header injection / response splitting"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Tomaz Cerar"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2016-5406",
      "discovery_date": "2016-06-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1359014"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The domain controller will not propagate its administrative RBAC configuration to some slaves. An attacker could use this to escalate their privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "EAP7 Privilege escalation when managing domain including earlier version slaves",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-5406"
        },
        {
          "category": "external",
          "summary": "RHBZ#1359014",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359014"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5406",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-5406"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5406",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5406"
        }
      ],
      "release_date": "2016-07-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:A/AC:M/Au:S/C:P/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "EAP7 Privilege escalation when managing domain including earlier version slaves"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Luca Bueti"
          ]
        },
        {
          "names": [
            "WildFly"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-6311",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2016-07-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1362735"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that when issuing a GET request which results in a 302 redirect, and when the request header \u0027Host\u0027 field was not set, the response header field \u0027Location\u0027 contains the internal IP address of the server. An attacker could use this disclose information which they are not authorized to access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "EAP7: Internal IP address disclosed on redirect when request header Host field is not set",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-6311"
        },
        {
          "category": "external",
          "summary": "RHBZ#1362735",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362735"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6311",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-6311"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6311",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6311"
        }
      ],
      "release_date": "2016-07-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        },
        {
          "category": "workaround",
          "details": "You can add a filter in the JBoss CLI that sets the host header to the \u0027myvirtualhost.com\u0027 if the host header is not present. eg:\n\n/subsystem=undertow/configuration=filter/expression-filter=hostname:add(expression=\"header(header=Host, value=myvirtualhost.com)\")\n/subsystem=undertow/server=default-server/host=default-host/filter-ref=hostname:add(predicate=\"not exists(%{i,Host})\")",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "EAP7: Internal IP address disclosed on redirect when request header Host field is not set"
    },
    {
      "cve": "CVE-2016-7046",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2016-09-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1376646"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that a long URL sent to EAP 7 Server operating as a reverse proxy with default buffer sizes causes a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-7046"
        },
        {
          "category": "external",
          "summary": "RHBZ#1376646",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376646"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-7046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7046"
        }
      ],
      "release_date": "2016-09-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS"
    },
    {
      "cve": "CVE-2016-7061",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2016-09-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1380852"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "EAP: Sensitive data can be exposed at the server level in domain mode",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-7061"
        },
        {
          "category": "external",
          "summary": "RHBZ#1380852",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7061",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-7061"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061"
        }
      ],
      "release_date": "2016-11-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "EAP: Sensitive data can be exposed at the server level in domain mode"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Brian Stansberry",
            "Darran Lofthouse"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2016-8627",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2016-09-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1388240"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-8627"
        },
        {
          "category": "external",
          "summary": "RHBZ#1388240",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8627",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-8627"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627"
        }
      ],
      "release_date": "2017-01-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files"
    },
    {
      "cve": "CVE-2016-8656",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "discovery_date": "2016-09-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1400344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "It was found that a variant of the Tomcat CVE-2016-1240 exploit is also applicable to Red Hat JBoss Enterprise Application Platform 5, 6, and 7. CVE-2016-8656 addresses these problems with JBoss EAP. The issue is now corrected in the various versions of Red Hat JBoss Enterprise Application Platform including EAP 6.4.13 and EAP 7.0.5. For further information please refer to https://access.redhat.com/articles/3016681",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-8656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1400344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-8656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656"
        }
      ],
      "release_date": "2016-09-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Gabriel Lavoie"
          ],
          "organization": "Halogen Software"
        }
      ],
      "cve": "CVE-2016-9589",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2016-12-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1404782"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that JBoss EAP 7 Header Cache was inefficient. An attacker could use this flaw to cause a denial of service attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-9589"
        },
        {
          "category": "external",
          "summary": "RHBZ#1404782",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404782"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9589",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-9589"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9589",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9589"
        }
      ],
      "release_date": "2017-03-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage"
    },
    {
      "cve": "CVE-2017-2595",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "discovery_date": "2017-01-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1413028"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that the log file viewer in Red Hat JBoss Enterprise Application 6 and 7 allows arbitrary file read to authenticated user via path traversal.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wildfly: Arbitrary file read via path traversal",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-2595"
        },
        {
          "category": "external",
          "summary": "RHBZ#1413028",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413028"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2595",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-2595"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2595",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2595"
        }
      ],
      "release_date": "2017-06-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "wildfly: Arbitrary file read via path traversal"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Radim Hatlapatka"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2017-2666",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2017-03-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1436163"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-2666"
        },
        {
          "category": "external",
          "summary": "RHBZ#1436163",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436163"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2666",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-2666"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2666",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2666"
        }
      ],
      "release_date": "2017-06-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Gregory Ramsperger",
            "Ryan Moak"
          ]
        }
      ],
      "cve": "CVE-2017-2670",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2017-04-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1438885"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that with non-clean TCP close, Websocket server gets into infinite loop on every IO thread, effectively causing DoS.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: IO thread DoS via unclean Websocket closing",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-2670"
        },
        {
          "category": "external",
          "summary": "RHBZ#1438885",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438885"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2670",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-2670"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2670",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2670"
        }
      ],
      "release_date": "2017-06-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "undertow: IO thread DoS via unclean Websocket closing"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Liao Xinxi"
          ],
          "organization": "NSFOCUS"
        }
      ],
      "cve": "CVE-2017-7525",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-06-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1462702"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of jackson-databind (in Satellite 6.0 and 6.1) and candlepin (which embeds a copy of jackson-databind in Satellite 6.2) as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time:\n\nCandlepin currently uses the default type resolution configuration for the ObjectMappers it creates/uses. Nowhere in candlepin do we enable global polymorphic deserialization via enableDefaultTyping(...), therefore based on the documentation sited BZ 1462702 , candlepin should not be affected.\n\nHowever as the vulnerable software ships with the product we have marked them as vulnerable to ensure the issue is tracked.\n\nJBoss EAP 7.x only uses the vulnerable Jackson Databind library for marshalling and unmarshalling of JSON objects passed to JAX-RS webservices. Some advise about how to remain safe when using JAX-RS webservices on JBoss EAP 7.x is available here: \n\nhttps://access.redhat.com/solutions/3279231\n\nAlthough JBoss Fuse ships the vulnerable version of jackson-databind, it does not call on enableDefaultTyping() for any polymorphic deserialization operations which is the root cause of this vulnerability. We have raised a Jira tracker to ensure that jackson-databind will be upgraded for Fuse 7.0, however due to feasibility issues jackson-databind cannot be upgraded in JBoss Fuse 6.3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7525"
        },
        {
          "category": "external",
          "summary": "RHBZ#1462702",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462702"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7525",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7525",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7525"
        }
      ],
      "release_date": "2017-07-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        },
        {
          "category": "workaround",
          "details": "Mitigation to this problem is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Gunnar Morling"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2017-7536",
      "discovery_date": "2017-06-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1465573"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that when the security manager\u0027s reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hibernate-validator: Privilege escalation when running under the security manager",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7536"
        },
        {
          "category": "external",
          "summary": "RHBZ#1465573",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465573"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7536"
        }
      ],
      "release_date": "2017-09-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hibernate-validator: Privilege escalation when running under the security manager"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Stuart Douglas"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2017-7559",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2017-08-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1481665"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7559"
        },
        {
          "category": "external",
          "summary": "RHBZ#1481665",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481665"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7559",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7559"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7559",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7559"
        }
      ],
      "release_date": "2017-12-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Stuart Douglas"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2017-12165",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490301"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that Undertow processes http request headers with unusual whitespaces which can cause possible http request smuggling.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: improper whitespace parsing leading to potential HTTP request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12165"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490301",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490301"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12165",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12165"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12165",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12165"
        }
      ],
      "release_date": "2017-12-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "undertow: improper whitespace parsing leading to potential HTTP request smuggling"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Brian Stansberry",
            "Jeremy Choi"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2017-12167",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "discovery_date": "2017-09-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1491612"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that properties based files of the management and the application realm configuration that contain user to role mapping are world readable allowing access to users and roles information to all the users logged in to the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "EAP-7: Wrong privileges on multiple property files",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
          "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
          "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1491612",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491612"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12167"
        }
      ],
      "release_date": "2017-09-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-12-13T18:26:13+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3458"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el6.src",
            "6Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el6.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-0:7.1.0-5.GA_redhat_5.ep7.el7.src",
            "7Server-JBEAP-7.1:eap7-jboss-ec2-eap-samples-0:7.1.0-5.GA_redhat_5.ep7.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "EAP-7: Wrong privileges on multiple property files"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.