First published: Mon Mar 12 2012(Updated: )
mod_cluster 1.0.10 before 1.0.10 CP03 and 1.1.x before 1.1.4, as used in JBoss Enterprise Application Platform 5.1.2, when "ROOT" is set to excludedContexts, exposes the root context of the server, which allows remote attackers to bypass access restrictions and gain access to applications deployed on the root context via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =5.1.2 | |
Red Hat ModCluster | =1.0.10 | |
Red Hat ModCluster | =1.1.0 | |
Red Hat ModCluster | =1.1.1 | |
Red Hat ModCluster | =1.1.2 | |
Red Hat ModCluster | =1.1.3 | |
Red Hat ModCluster | =1.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1154 is classified as a high-severity vulnerability that allows unauthorized access to server applications.
To fix CVE-2012-1154, update your Red Hat JBoss Enterprise Application Platform to version 5.1.2 CP03 or later, or modify the excludedContexts setting appropriately.
CVE-2012-1154 affects mod_cluster versions 1.0.10 before CP03 and 1.1.x before 1.1.4, as well as JBoss Enterprise Application Platform version 5.1.2.
The potential consequences of CVE-2012-1154 include unauthorized access to deployed applications and potential data compromise.
Yes, CVE-2012-1154 has been patched in the appropriate versions of the affected software since its discovery.