SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Red Hat JBoss Vendors:   Red Hat
Red Hat JBoss Web Framework Bug in AuthenticationFilter Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1030457
SecurityTracker URL:  http://securitytracker.com/id/1030457
CVE Reference:   CVE-2014-0248   (Links to External Site)
Updated:  Jun 25 2014
Original Entry Date:  Jun 24 2014
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Red Hat JBoss Web Framework. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted authentication headers to trigger a Seam logging error in 'org.jboss.seam.web.AuthenticationFilter' and execute arbitrary code on the target system.

Marek Schmidt of Red Hat reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

https://rhn.redhat.com/errata/RHSA-2014-0785.html
https://rhn.redhat.com/errata/RHSA-2014-0791.html
https://rhn.redhat.com/errata/RHSA-2014-0792.html
https://rhn.redhat.com/errata/RHSA-2014-0793.html
https://rhn.redhat.com/errata/RHSA-2014-0794.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2014-0785.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Red Hat Enterprise)

Message History:   None.


 Source Message Contents

Subject:  [RHSA-2014:0785-01] Important: Red Hat JBoss Web Framework Kit 2.5.0 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Web Framework Kit 2.5.0 security update
Advisory ID:       RHSA-2014:0785-01
Product:           Red Hat JBoss Web Framework Kit
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2014-0785.html
Issue date:        2014-06-23
CVE Names:         CVE-2014-0248 
=====================================================================

1. Summary:

An update for the Seam component of Red Hat JBoss Web Framework Kit 2.5.0
that fixes one security issue is now available from the Red Hat Customer
Portal.

The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

2. Description:

Red Hat JBoss Web Framework Kit combines popular open source web frameworks
into a single solution for Java applications. Seam is an open source
development platform for building rich Internet applications in Java.
Seam integrates technologies such as Asynchronous JavaScript and XML
(AJAX), JavaServer Faces (JSF), Java Persistence API (JPA), and Enterprise
Java Beans (EJB). Seam 2.3 provides support for JSF 2, RichFaces 4, and JPA
2 capabilities, running on top of Red Hat JBoss Enterprise Application
Platform 6.

It was found that the org.jboss.seam.web.AuthenticationFilter class
implementation did not properly use Seam logging. A remote attacker could
send specially crafted authentication headers to an application, which
could result in arbitrary code execution with the privileges of the user
running that application. (CVE-2014-0248)

All users of Red Hat JBoss Web Framework Kit 2.5.0 as provided from the Red
Hat Customer Portal are advised to apply this update.

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the update). Before applying this update, back up your
existing installation of Red Hat JBoss Web Framework Kit.

The JBoss server process must be restarted for this update to take effect.

4. Bugs fixed (https://bugzilla.redhat.com/):

1101619 - CVE-2014-0248 JBoss Seam: RCE via unsafe logging in AuthenticationFilter

5. References:

https://www.redhat.com/security/data/cve/CVE-2014-0248.html
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=web.framework.kit&downloadType=securityPatches&version=2.5.0

6. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFTqHdoXlSAg2UNWIIRAtaPAJ45cpvX/0QMR6qHhf9HA53OrvTWVgCeNWNq
S++zth5HhzSZjoufaSqYpPU=
=aJ59
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC