Red Hat JBoss Data Grid Deserialization Flaw in Infinispan Lets Remote Authenticated Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID: 1040360|
SecurityTracker URL: http://securitytracker.com/id/1040360
CVE-2014-9970, CVE-2017-15089, CVE-2017-7525
(Links to External Site)
Date: Feb 12 2018
Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
A vulnerability was reported in Red Hat JBoss Data Grid. A remote authenticated user can execute arbitrary code on the target system.|
A remote authenticated user can send specially crafted data to trigger a deserialization error in the Hotrod client in the Infinispan component to inject an arbitrary object into the data cache and potentially execute arbitrary code on the target client system.
Man Yue Mo (Semmle/lgtm.com) reported this vulnerability.
A remote authenticated user can execute arbitrary code on the target client system.|
Red Hat has issued a fix (Data Grid 7.1.2).|
The Red Hat advisory is available at:
Vendor URL: access.redhat.com/errata/RHSA-2018:0294 (Links to External Site)
Access control error|
|Underlying OS: Linux (Red Hat Enterprise)|
Source Message Contents
Subject: [RHSA-2018:0294-01] Important: Red Hat JBoss Data Grid 7.1.2 security update|
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Data Grid 7.1.2 security update
Advisory ID: RHSA-2018:0294-01
Product: Red Hat JBoss Data Grid
Advisory URL: https://access.redhat.com/errata/RHSA-2018:0294
Issue date: 2018-02-12
CVE Names: CVE-2014-9970 CVE-2017-7525 CVE-2017-15089
Red Hat JBoss Data Grid 7.1.2 is now available for download from the
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Red Hat JBoss Data Grid is a distributed in-memory data grid, based on
This release of Red Hat JBoss Data Grid 7.1.2 serves as a replacement for
Red Hat JBoss Data Grid 7.1.1, and includes bug fixes and enhancements,
which are documented in the Release Notes document linked to in the
* A deserialization flaw was discovered in the jackson-databind which could
allow an unauthenticated user to perform code execution by sending the
maliciously crafted input to the readValue method of the ObjectMapper.
* It was found that the Hotrod client in Infinispan would unsafely read
deserialized data on information from the cache. An authenticated attacker
could inject a malicious object into the data cache and attain
deserialization on the client, and possibly conduct further attacks.
* A vulnerability was found in Jasypt that would allow an attacker to
perform a timing attack on password hash comparison. (CVE-2014-9970)
Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting
CVE-2017-7525 and Man Yue Mo (Semmle/lgtm.com) for reporting
The References section of this erratum contains a download link (you must
log in to download the update).
Before applying the update, back up your existing Red Hat JBoss Data Grid
installation (including databases, configuration files, and so on).
4. Bugs fixed (https://bugzilla.redhat.com/):
1455566 - CVE-2014-9970 jasypt: Vulnerable to timing attack against the password hash comparison
1462702 - CVE-2017-7525 jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
1503610 - CVE-2017-15089 infinispan: Unsafe deserialization of malicious object injected into data cache
The Red Hat security contact is <firstname.lastname@example.org>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
-----END PGP SIGNATURE-----
RHSA-announce mailing list