First published: Fri Jun 10 2011(Updated: )
jboss-seam.jar in the JBoss Seam 2 framework 2.2.x and earlier, as distributed in Red Hat JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0; JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3.0, 4.3.0.CP09, and 5.1.1; and JBoss Enterprise Web Platform 5.1.1, does not properly restrict use of Expression Language (EL) statements in FacesMessages during page exception handling, which allows remote attackers to execute arbitrary Java code via a crafted URL to an application. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1484.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat jboss enterprise application platform | =4.3.0 | |
redhat jboss enterprise application platform | =4.3.0-cp09 | |
redhat jboss enterprise application platform | =5.1.1 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp05 | |
Red Hat JBoss Enterprise SOA Platform | =5.1.0 | |
Red Hat JBoss Enterprise Web Platform | =5.1.1 | |
Red Hat JBoss Seam 2 Framework | <=2.2.2 | |
Red Hat JBoss Seam 2 Framework | =2.0.0-beta1 | |
Red Hat JBoss Seam 2 Framework | =2.0.0-cr1 | |
Red Hat JBoss Seam 2 Framework | =2.0.0-cr2 | |
Red Hat JBoss Seam 2 Framework | =2.0.0-cr3 | |
Red Hat JBoss Seam 2 Framework | =2.0.0-ga | |
Red Hat JBoss Seam 2 Framework | =2.0.1-cr1 | |
Red Hat JBoss Seam 2 Framework | =2.0.1-cr2 | |
Red Hat JBoss Seam 2 Framework | =2.0.1-ga | |
Red Hat JBoss Seam 2 Framework | =2.0.2-cr1 | |
Red Hat JBoss Seam 2 Framework | =2.0.2-cr2 | |
Red Hat JBoss Seam 2 Framework | =2.0.2-ga | |
Red Hat JBoss Seam 2 Framework | =2.0.2-sp1 | |
Red Hat JBoss Seam 2 Framework | =2.0.3-cr1 | |
Red Hat JBoss Seam 2 Framework | =2.1.0-alpha1 | |
Red Hat JBoss Seam 2 Framework | =2.1.0-beta1 | |
Red Hat JBoss Seam 2 Framework | =2.1.0-cr1 | |
Red Hat JBoss Seam 2 Framework | =2.1.0-ga | |
Red Hat JBoss Seam 2 Framework | =2.1.0-sp1 | |
Red Hat JBoss Seam 2 Framework | =2.1.1-cr1 | |
Red Hat JBoss Seam 2 Framework | =2.1.1-cr2 | |
Red Hat JBoss Seam 2 Framework | =2.1.1-ga | |
Red Hat JBoss Seam 2 Framework | =2.1.2 | |
Red Hat JBoss Seam 2 Framework | =2.1.2-cr1 | |
Red Hat JBoss Seam 2 Framework | =2.1.2-cr2 | |
Red Hat JBoss Seam 2 Framework | =2.2.0-cr1 | |
Red Hat JBoss Seam 2 Framework | =2.2.0-ga | |
Red Hat JBoss Seam 2 Framework | =2.2.1 | |
Red Hat JBoss Seam 2 Framework | =2.2.1-cr1 | |
Red Hat JBoss Seam 2 Framework | =2.2.1-cr2 | |
Red Hat JBoss Seam 2 Framework | =2.2.1-cr3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2196 is classified as a high severity vulnerability that can lead to potential security breaches in affected JBoss Seam frameworks.
To fix CVE-2011-2196, you should upgrade to JBoss Seam framework version 2.2.2 or later, or apply the specific patches provided by Red Hat.
CVE-2011-2196 affects JBoss Seam versions 2.2.x and earlier, as well as various versions of the Red Hat JBoss Enterprise Application Platform, SOA Platform, and Web Platform.
CVE-2011-2196 can potentially allow attackers to bypass security restrictions, leading to unauthorized access or code execution.
While upgrading is the best course of action, implementing strict user access controls may serve as a temporary workaround against CVE-2011-2196.