Red Hat JBoss Web Framework Bug in AuthenticationFilter Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1030457|
SecurityTracker URL: http://securitytracker.com/id/1030457
(Links to External Site)
Updated: Jun 25 2014|
Original Entry Date: Jun 24 2014
Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
A vulnerability was reported in Red Hat JBoss Web Framework. A remote user can execute arbitrary code on the target system.|
A remote user can send specially crafted authentication headers to trigger a Seam logging error in 'org.jboss.seam.web.AuthenticationFilter' and execute arbitrary code on the target system.
Marek Schmidt of Red Hat reported this vulnerability.
A remote user can execute arbitrary code on the target system.|
The vendor has issued a fix.|
The vendor's advisory is available at:
Vendor URL: rhn.redhat.com/errata/RHSA-2014-0785.html (Links to External Site)
|Underlying OS: Linux (Red Hat Enterprise)|
Source Message Contents
Subject: [RHSA-2014:0785-01] Important: Red Hat JBoss Web Framework Kit 2.5.0 security update|
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Web Framework Kit 2.5.0 security update
Advisory ID: RHSA-2014:0785-01
Product: Red Hat JBoss Web Framework Kit
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0785.html
Issue date: 2014-06-23
CVE Names: CVE-2014-0248
An update for the Seam component of Red Hat JBoss Web Framework Kit 2.5.0
that fixes one security issue is now available from the Red Hat Customer
The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Red Hat JBoss Web Framework Kit combines popular open source web frameworks
into a single solution for Java applications. Seam is an open source
development platform for building rich Internet applications in Java.
(AJAX), JavaServer Faces (JSF), Java Persistence API (JPA), and Enterprise
Java Beans (EJB). Seam 2.3 provides support for JSF 2, RichFaces 4, and JPA
2 capabilities, running on top of Red Hat JBoss Enterprise Application
It was found that the org.jboss.seam.web.AuthenticationFilter class
implementation did not properly use Seam logging. A remote attacker could
send specially crafted authentication headers to an application, which
could result in arbitrary code execution with the privileges of the user
running that application. (CVE-2014-0248)
All users of Red Hat JBoss Web Framework Kit 2.5.0 as provided from the Red
Hat Customer Portal are advised to apply this update.
The References section of this erratum contains a download link (you must
log in to download the update). Before applying this update, back up your
existing installation of Red Hat JBoss Web Framework Kit.
The JBoss server process must be restarted for this update to take effect.
4. Bugs fixed (https://bugzilla.redhat.com/):
1101619 - CVE-2014-0248 JBoss Seam: RCE via unsafe logging in AuthenticationFilter
The Red Hat security contact is <firstname.lastname@example.org>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
-----END PGP SIGNATURE-----
RHSA-announce mailing list