Show filters
42 Total Results
Displaying 31-40 of 42
Sort by:
Attacker Value
Unknown

CVE-2017-12165

Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was discovered that Undertow before 1.4.17, 1.3.31 and 2.0.0 processes http request headers with unusual whitespaces which can cause possible http request smuggling.
0
Attacker Value
Unknown

CVE-2017-2670

Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS.
0
Attacker Value
Unknown

CVE-2017-2666

Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
0
Attacker Value
Unknown

CVE-2017-2582

Disclosure Date: July 26, 2018 (last updated November 27, 2024)
It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.
0
Attacker Value
Unknown

CVE-2017-12167

Disclosure Date: July 26, 2018 (last updated November 27, 2024)
It was found in EAP 7 before 7.0.9 that properties based files of the management and the application realm configuration that contain user to role mapping are world readable allowing access to users and roles information to all the users logged in to the system.
0
Attacker Value
Unknown

CVE-2017-7465

Disclosure Date: June 27, 2018 (last updated November 26, 2024)
It was found that the JAXP implementation used in JBoss EAP 7.0 for XSLT processing is vulnerable to code injection. An attacker could use this flaw to cause remote code execution if they are able to provide XSLT content for parsing. Doing a transform in JAXP requires the use of a 'javax.xml.transform.TransformerFactory'. If the FEATURE_SECURE_PROCESSING feature is set to 'true', it mitigates this vulnerability.
0
Attacker Value
Unknown

CVE-2016-8656

Disclosure Date: May 22, 2018 (last updated November 08, 2023)
Jboss jbossas before versions 5.2.0-23, 6.4.13, 7.0.5 is vulnerable to an unsafe file handling in the jboss init script which could result in local privilege escalation.
0
Attacker Value
Unknown

CVE-2016-8627

Disclosure Date: May 11, 2018 (last updated November 08, 2023)
admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired.
0
Attacker Value
Unknown

CVE-2017-12196

Disclosure Date: April 18, 2018 (last updated November 26, 2024)
undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server.
0
Attacker Value
Unknown

CVE-2017-12629

Disclosure Date: October 14, 2017 (last updated November 08, 2023)
Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.