Redhat Jboss Enterprise Web Server vulnerabilities

34 known vulnerabilities affecting redhat/jboss_enterprise_web_server.

Total CVEs
34
CISA KEV
3
actively exploited
Public exploits
7
Exploited in wild
3
Severity breakdown
CRITICAL7HIGH16MEDIUM10LOW1

Vulnerabilities

Page 1 of 2
CVE-2020-25710HIGHCVSS 7.5v2.0.02021-05-28
CVE-2020-25710 [HIGH] CWE-617 CVE-2020-25710: A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a mal A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
nvd
CVE-2012-5626HIGHCVSS 7.5v1.0.02020-01-23
CVE-2012-5626 [HIGH] CVE-2012-5626: EJB method in Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; Red Hat JBoss O EJB method in Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; Red Hat JBoss Operations Network 3.1; Red Hat JBoss Portal 4 and 5; Red Hat JBoss SOA Platform 4.2, 4.3, and 5; in Red Hat JBoss Enterprise Web Server 1 ignores roles specified using the @RunAs annotation.
nvd
CVE-2019-19906HIGHCVSS 7.5v2.0.02019-12-19
CVE-2019-19906 [HIGH] CWE-193 CVE-2019-19906: cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote deni cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.
nvd
CVE-2014-3699CRITICALCVSS 9.8v1.0.02019-12-15
CVE-2014-3699 [CRITICAL] CWE-502 CVE-2014-3699: eDeploy has RCE via cPickle deserialization of untrusted data eDeploy has RCE via cPickle deserialization of untrusted data
nvd
CVE-2012-2148LOWCVSS 3.3v1.0.02019-12-06
CVE-2012-2148 [LOW] CWE-269 CVE-2012-2148: An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores jav An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies
nvd
CVE-2014-3700CRITICALCVSS 9.8v1.0.02019-11-21
CVE-2014-3700 [CRITICAL] CWE-74 CVE-2014-3700: eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data
nvd
CVE-2014-3655MEDIUMCVSS 4.3v1.0.02019-11-13
CVE-2014-3655 [MEDIUM] CWE-352 CVE-2014-3655: JBoss KeyCloak is vulnerable to soft token deletion via CSRF JBoss KeyCloak is vulnerable to soft token deletion via CSRF
nvd
CVE-2011-3923CRITICALCVSS 9.8PoCv1.0.02019-11-01
CVE-2011-3923 [CRITICAL] CWE-732 CVE-2011-3923: Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the Parameter Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
nvd
CVE-2019-1559MEDIUMCVSS 5.9v5.0.02019-02-27
CVE-2019-1559 [MEDIUM] CWE-203 CVE-2019-1559: If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to sen If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behave
nvd
CVE-2018-1336HIGHCVSS 7.5v3.0.0v5.0.02018-08-02
CVE-2018-1336 [HIGH] CWE-835 CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an in An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.
nvd
CVE-2018-1304MEDIUMCVSS 5.9v3.0.02018-02-28
CVE-2018-1304 [MEDIUM] CVE-2018-1304: The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly ha The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access
nvd
CVE-2015-7501CRITICALCVSS 9.8v3.0.02017-11-09
CVE-2015-7501 [CRITICAL] CWE-502 CVE-2015-7501: Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualiza Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Ha
nvd
CVE-2017-12613HIGHCVSS 7.1v3.0.02017-10-24
CVE-2017-12613 [HIGH] CWE-125 CVE-2017-12613: When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value i When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may rep
nvd
CVE-2017-12617HIGHCVSS 8.1KEVPoCv2.0.0v3.0.02017-10-04
CVE-2017-12617 [HIGH] CWE-434 CVE-2017-12617: When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0. When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code
nvd
CVE-2015-5184HIGHCVSS 7.5v1.0.02017-09-25
CVE-2015-5184 [HIGH] CVE-2015-5184: Console: CORS headers set to allow all in Red Hat AMQ. Console: CORS headers set to allow all in Red Hat AMQ.
nvd
CVE-2015-5183HIGHCVSS 7.5v1.0.02017-09-25
CVE-2015-5183 [HIGH] CVE-2015-5183: Console: HTTPOnly and Secure attributes not set on cookies in Red Hat AMQ. Console: HTTPOnly and Secure attributes not set on cookies in Red Hat AMQ.
nvd
CVE-2017-12615HIGHCVSS 8.1KEVPoCv2.0.0v3.0.02017-09-19
CVE-2017-12615 [HIGH] CWE-434 CVE-2017-12615: When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the r When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
nvd
CVE-2016-6796HIGHCVSS 7.5v3.0.02017-08-11
CVE-2016-6796 [HIGH] CVE-2016-6796: A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
nvd
CVE-2016-5018CRITICALCVSS 9.1PoCv3.0.02017-08-10
CVE-2016-5018 [CRITICAL] CVE-2016-5018: In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.
nvd
CVE-2016-6797HIGHCVSS 7.5v3.0.02017-08-10
CVE-2016-6797 [HIGH] CWE-863 CVE-2016-6797: The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0. The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resour
nvd