CVE-2016-2141Improper Input Validation in Redhat Jgroups

Severity
9.8CRITICALNVD
EPSS
2.4%
top 15.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 30
Latest updateMay 13

Description

It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

Patches

🔴Vulnerability Details

4
OSV
Improper Input Validation in JGroups2022-05-13
GHSA
Improper Input Validation in JGroups2022-05-13
OSV
CVE-2016-2141: It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster2016-06-30
CVEList
CVE-2016-2141: It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster2016-06-30

📋Vendor Advisories

2
Red Hat
JGroups: Authorization bypass2016-06-23
Debian
CVE-2016-2141: libjgroups-java - It was found that JGroups did not require necessary headers for encrypt and auth...2016

💬Community

1
Bugzilla
CVE-2016-2141 JGroups: Authorization bypass2016-03-02
CVE-2016-2141 — Improper Input Validation in Redhat | cvebase