Permissions, Privileges, and Access Controls in Wildfly Core - CVE-2019-14838
Published: November 27, 2019
Vulnerability identifier: #VU23014
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-14838
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Red Hat Inc.
Affected software:
Wildfly Core
Wildfly Core
Detailed vulnerability description
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to wildfly-core allows unnecessary write permissions for management users with Monitor, Auditor and Deployer roles. A remote authenticated user can modify server runtime state and escalate privileges within the application.
How to mitigate CVE-2019-14838
Install updates from vendor's website.
Sources
- https://github.com/wildfly/wildfly-core/commit/80e18b46f73f9d061d4150c66e6dc2fc1fd0bc41
- https://access.redhat.com/errata/RHSA-2019:3082
- https://access.redhat.com/errata/RHSA-2019:3083
- https://access.redhat.com/errata/RHSA-2019:4018
- https://access.redhat.com/errata/RHSA-2019:4019
- https://access.redhat.com/errata/RHSA-2019:4020
- https://access.redhat.com/errata/RHSA-2019:4021
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14838