Multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform



Published: 2021-11-17 | Updated: 2022-12-14
Risk Medium
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2021-30129
CVE-2021-37714
CVE-2021-3629
CVE-2021-20289
CVE-2021-3717
CWE-ID CWE-119
CWE-835
CWE-400
CWE-200
CWE-552
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
JBoss Enterprise Application Platform
Server applications / Application servers

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU56931

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-30129

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the sshd-core of Apache Mina SSHD. A remote attacker can send specially crafted requests to the server, trigger buffer overflow and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.4.0 - 7.4.1


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:4676
http://access.redhat.com/errata/RHSA-2021:4677

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Infinite loop

EUVDB-ID: #VU58176

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-37714

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when processing untrusted HTML and XML code. A remote attacker can consume all available system resources and cause denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.4.0 - 7.4.1


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:4676
http://access.redhat.com/errata/RHSA-2021:4677

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Resource exhaustion

EUVDB-ID: #VU58177

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-3629

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to Undertow does not properly control consumption of internal resources when processing HTTP/2 requests. A remote attacker can send specially crafted HTTP/2 requests to the web server, trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.4.0 - 7.4.1


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:4676
http://access.redhat.com/errata/RHSA-2021:4677

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Information disclosure

EUVDB-ID: #VU56965

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-20289

CWE-ID: CWE-200 - Information Exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. A remote attacker can obtain endpoint class and method names.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.4.0 - 7.4.1


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:4676
http://access.redhat.com/errata/RHSA-2021:4677

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Files or Directories Accessible to External Parties

EUVDB-ID: #VU58178

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-3717

CWE-ID: CWE-552 - Files or Directories Accessible to External Parties

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an incorrect JBOSS_LOCAL_USER challenge location. A local unprivileged user can access any user account on the affected system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 7.4.0 - 7.4.1


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:4676
http://access.redhat.com/errata/RHSA-2021:4677

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###