Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Server/CGI)  >   Red Hat JBoss Vendors:   Red Hat
Red Hat JBoss Data Grid Deserialization Flaw in Infinispan Lets Remote Authenticated Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1040360
SecurityTracker URL:
CVE Reference:   CVE-2014-9970, CVE-2017-15089, CVE-2017-7525   (Links to External Site)
Date:  Feb 12 2018
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Red Hat JBoss Data Grid. A remote authenticated user can execute arbitrary code on the target system.

A remote authenticated user can send specially crafted data to trigger a deserialization error in the Hotrod client in the Infinispan component to inject an arbitrary object into the data cache and potentially execute arbitrary code on the target client system.

Man Yue Mo (Semmle/ reported this vulnerability.

Impact:   A remote authenticated user can execute arbitrary code on the target client system.
Solution:   Red Hat has issued a fix (Data Grid 7.1.2).

The Red Hat advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Red Hat Enterprise)

Message History:   None.

 Source Message Contents

Subject:  [RHSA-2018:0294-01] Important: Red Hat JBoss Data Grid 7.1.2 security update

Hash: SHA1

                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Data Grid 7.1.2 security update
Advisory ID:       RHSA-2018:0294-01
Product:           Red Hat JBoss Data Grid
Advisory URL:
Issue date:        2018-02-12
CVE Names:         CVE-2014-9970 CVE-2017-7525 CVE-2017-15089 

1. Summary:

Red Hat JBoss Data Grid 7.1.2 is now available for download from the
Customer Portal.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Data Grid is a distributed in-memory data grid, based on

This release of Red Hat JBoss Data Grid 7.1.2 serves as a replacement for
Red Hat JBoss Data Grid 7.1.1, and includes bug fixes and enhancements,
which are documented in the Release Notes document linked to in the

Security Fix(es):

* A deserialization flaw was discovered in the jackson-databind which could
allow an unauthenticated user to perform code execution by sending the
maliciously crafted input to the readValue method of the ObjectMapper.

* It was found that the Hotrod client in Infinispan would unsafely read
deserialized data on information from the cache. An authenticated attacker
could inject a malicious object into the data cache and attain
deserialization on the client, and possibly conduct further attacks.

* A vulnerability was found in Jasypt that would allow an attacker to
perform a timing attack on password hash comparison. (CVE-2014-9970)

Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting
CVE-2017-7525 and Man Yue Mo (Semmle/ for reporting

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the update).

Before applying the update, back up your existing Red Hat JBoss Data Grid
installation (including databases, configuration files, and so on).

4. Bugs fixed (

1455566 - CVE-2014-9970 jasypt: Vulnerable to timing attack against the password hash comparison
1462702 - CVE-2017-7525 jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
1503610 - CVE-2017-15089 infinispan: Unsafe deserialization of malicious object injected into data cache

5. References:

6. Contact:

The Red Hat security contact is <>. More contact
details at

Copyright 2018 Red Hat, Inc.
Version: GnuPG v1


RHSA-announce mailing list

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC