SB2018062717 - Multiple vulnerabilities in JBoss Enterprise Application Platform



SB2018062717 - Multiple vulnerabilities in JBoss Enterprise Application Platform

Published: June 27, 2018 Updated: August 8, 2020

Security Bulletin ID SB2018062717
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-3894)

The vulnerability allows a remote authenticated user to execute arbitrary code.

It was discovered that the ElytronManagedThread in Wildfly's Elytron subsystem in versions from 11 to 16 stores a SecurityIdentity to run the thread as. These threads do not necessarily terminate if the keep alive time has not expired. This could allow a shared thread to use the wrong security identity when executing.


2) Code Injection (CVE-ID: CVE-2017-7465)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

It was found that the JAXP implementation used in JBoss EAP 7.0 for XSLT processing is vulnerable to code injection. An attacker could use this flaw to cause remote code execution if they are able to provide XSLT content for parsing. Doing a transform in JAXP requires the use of a 'javax.xml.transform.TransformerFactory'. If the FEATURE_SECURE_PROCESSING feature is set to 'true', it mitigates this vulnerability.


Remediation

Install update from vendor's website.