First published: Mon Jan 12 2009(Updated: )
The request handler in JBossWS in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP06 and 4.3 before 4.3.0.CP04 does not properly validate the resource path during a request for a WSDL file with a custom web-service endpoint, which allows remote attackers to read arbitrary XML files via a crafted request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Enterprise Application Platform | =4.2.0-cp01 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp06 | |
Redhat Jboss Enterprise Application Platform | =4.3.0-cp01 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp05 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp04 | |
Redhat Jboss Enterprise Application Platform | =4.3.0-cp04 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp03 | |
Redhat Jboss Enterprise Application Platform | =4.3.0-cp03 | |
Redhat Jboss Enterprise Application Platform | =4.3.0-cp02 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.