First published: Mon Jan 12 2009(Updated: )
The request handler in JBossWS in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP06 and 4.3 before 4.3.0.CP04 does not properly validate the resource path during a request for a WSDL file with a custom web-service endpoint, which allows remote attackers to read arbitrary XML files via a crafted request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp01 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp06 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp01 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp05 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp04 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp04 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp03 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp03 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp02 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0027 has been assigned a moderate severity level due to the potential for information disclosure.
To fix CVE-2009-0027, upgrade your JBoss Enterprise Application Platform to versions 4.2.0.CP06 or 4.3.0.CP04 or later.
CVE-2009-0027 can be exploited by remote attackers to read arbitrary files through improperly validated requests for WSDL files.
CVE-2009-0027 affects JBoss Enterprise Application Platform versions 4.2.0 up to 4.2.0.CP05 and 4.3.0 up to 4.3.0.CP03.
CVE-2009-0027 is not considered critical but poses a risk that should be addressed to prevent potential data exposure.