Risk | High |
Patch available | YES |
Number of vulnerabilities | 13 |
CVE-ID | CVE-2018-19360 CVE-2018-14719 CVE-2018-19361 CVE-2018-19362 CVE-2019-0201 CVE-2018-14718 CVE-2018-12023 CVE-2018-8088 CVE-2018-1335 CVE-2018-11307 CVE-2018-11798 CVE-2018-12022 CVE-2016-5397 |
CWE-ID | CWE-20 CWE-284 CWE-264 CWE-502 CWE-78 CWE-200 CWE-77 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #9 is available. |
Vulnerable software Subscribe |
JBoss Data Virtualization Server applications / Virtualization software |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 13 vulnerabilities.
EUVDB-ID: #VU17780
Risk: High
CVSSv3.1:
CVE-ID: CVE-2018-19360
CWE-ID:
Exploit availability:
DescriptionThe disclosed vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code.
The vulnerability exists due to fail to block the axis2-transport-jmsclass from polymorphic deserialization. A remote attacker can send a specially crafted request that submits malicious input to perform unauthorized actions on the system, which could allow the attacker to execute arbitrary code or cause a denial of service (DoS) condition.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU17778
Risk: High
CVSSv3.1:
CVE-ID: CVE-2018-14719
CWE-ID:
Exploit availability:
DescriptionThe disclosed vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to fail to block blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. A remote attacker can send a specially crafted request that submits malicious input to execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU17779
Risk: High
CVSSv3.1:
CVE-ID: CVE-2018-19361
CWE-ID:
Exploit availability:
DescriptionThe disclosed vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code.
The vulnerability exists due to fail to block the openjpa class from polymorphic deserialization. A remote attacker can send a specially crafted request that submits malicious input to perform unauthorized actions on the system, which could allow the attacker to execute arbitrary code or cause a denial of service (DoS) condition.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU17781
Risk: High
CVSSv3.1:
CVE-ID: CVE-2018-19362
CWE-ID:
Exploit availability:
DescriptionThe disclosed vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code.
The vulnerability exists due to fail to block the jboss-common-coreclass from polymorphic deserialization. A remote attacker can send a specially crafted request that submits malicious input to perform unauthorized actions on the system, which could allow the attacker to execute arbitrary code or cause a denial of service (DoS) condition.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU18668
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2019-0201
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions when "getACL()" command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. A remote attacker can gain READ permissions to list ACL.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU17053
Risk: High
CVSSv3.1:
CVE-ID: CVE-2018-14718
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to the failure to block the slf4j-ext class from polymorphic deserialization. A remote attacker can execute arbitrary code with elevated privileges.
Install updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU19943
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2018-12023
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists when Default Typing is enabled and the service has the Oracle JDBC jar in the classpath. A remote attacker can provide an LDAP service to access and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU11301
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2018-8088
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote unauthenticated attacker to bypass access restrictions on the target system.
The weakness exists in the org.slf4j.ext.EventData class due to improper security restrictions. A remote attacker can send specially crafted input, bypass access restrictions and gain unauthorized access to perform further attacks.
Install updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU21947
Risk: High
CVSSv3.1:
CVE-ID: CVE-2018-1335
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to incorrect processing of HTTP headers in Apache Tika server. A remote unauthenticated attacker can send specially crafted headers to the affected server and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU19938
Risk: High
CVSSv3.1:
CVE-ID: CVE-2018-11307
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the usage of default typing along with a gadget class from iBatis, which allows exfiltration of content. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU16947
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2018-11798
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to unspecified flaw. A remote attacker can access files outside the set webservers docroot path.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU19942
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2018-12022
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists when Default Typing is enabled and the service has the Jodd-db jar in the classpath. A remote attacker can provide an LDAP service to access and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU11178
Risk: High
CVSSv3.1:
CVE-ID: CVE-2016-5397
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.
The weakness exists in the ft_go_generator.cc:format_go_output()function due to command injection. A remote attacker can submit a specially crafted service name through an external formatting tool and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
Install updates from vendor's website.
JBoss Data Virtualization: 6.4.7
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2019:3140
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?