Severity
9.8CRITICAL
EPSS
0.4%
top 41.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 9
Latest updateMay 13

Description

An issue was discovered in WildFly 10.1.2.Final. In the case of a default installation without a security realm reference, an attacker can successfully access the server without authentication. NOTE: the Security Realms documentation in the product's Admin Guide indicates that "without a security realm reference" implies "effectively unsecured." The vendor explicitly supports these unsecured configurations because they have valid use cases during development

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDredhat/wildfly10.1.2

🔴Vulnerability Details

2
GHSA
GHSA-rw67-4595-c74r: ** DISPUTED ** An issue was discovered in WildFly 102022-05-13
CVEList
CVE-2018-10683: An issue was discovered in WildFly 102018-05-09

📋Vendor Advisories

1
Red Hat
wildfly: Missing authentication in edfault installation without a security realm reference2018-05-02

💬Community

1
Bugzilla
CVE-2018-10683 wildfly: Missing authentication in edfault installation without a security realm reference2018-10-04