Red Hat JBoss EAP XML Deserialization Flaw in SLF4J Component Lets Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID: 1040627|
SecurityTracker URL: http://securitytracker.com/id/1040627
(Links to External Site)
Date: Apr 4 2018
Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): EAP 6.4, 7.1|
A vulnerability was reported in Red Hat JBoss Enterprise Application Platform (EAP). A remote user can execute arbitrary code on the target system.|
A remote user can send specially crafted XML data to trigger a deserialization error in the Simple Logging Facade for Java (SLF4J) EventData constructor and execute arbitrary code on the target system.
Chris McCown reported this vulnerability.
A remote user can execute arbitrary code on the target system.|
Red Hat has issued a fix.|
The Red Hat advisories are available at:
Vendor URL: access.redhat.com/errata/RHSA-2018:0630 (Links to External Site)
|Underlying OS: Linux (Red Hat Enterprise)|
|Underlying OS Comments: 5, 6, 7|
This archive entry has one or more follow-up message(s) listed below.|
Source Message Contents
Subject: [RHSA-2018:0630-01] Important: Red Hat JBoss Enterprise Application Platform 6.4 security update|
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.4 security update
Advisory ID: RHSA-2018:0630-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2018:0630
Issue date: 2018-04-03
CVE Names: CVE-2018-8088
Updated packages that provide Red Hat JBoss Enterprise Application Platform
6.4 and fix three security issues, several bugs, and add various
enhancements are now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.
This asynchronous patch is a security update for slf4j package in Red Hat
JBoss Enterprise Application Platform 6.4.
* An XML deserialization vulnerability was discovered in slf4j's EventData
which accepts xml serialized string and can lead to arbitrary code
The Simple Logging Facade for Java or (SLF4J) is a simple facade for
various logging APIs allowing the end-user to plug in the desired
implementation at deployment time. SLF4J also allows for a gradual
migration path away from Jakarta Commons Logging (JCL).
Red Hat would like to thank Chris McCown for reporting CVE-2018-8088.
Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.
The References section of this erratum contains a download link (you must
log in to download the update).
The JBoss server process must be restarted for the update to take effect.
4. Bugs fixed (https://bugzilla.redhat.com/):
1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
The Red Hat security contact is <firstname.lastname@example.org>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
-----END PGP SIGNATURE-----
RHSA-announce mailing list