First published: Thu May 16 2013(Updated: )
The default configuration of Red Hat JBoss Portal before 6.1.0 enables the JGroups diagnostics service with no authentication when a JGroups channel is started, which allows remote attackers to obtain sensitive information (diagnostics) by accessing the service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Portal | <=6.0.0 | |
Red Hat JBoss Portal | =4.3.0 | |
Red Hat JBoss Portal | =5.0.0 | |
Red Hat JBoss Portal | =5.0.1 | |
Red Hat JBoss Portal | =5.1.0 | |
Red Hat JBoss Portal | =5.1.1 | |
Red Hat JBoss Portal | =5.2.0 | |
Red Hat JBoss Portal | =5.2.1 | |
Red Hat JBoss Portal | =5.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2102 is classified as a moderate severity vulnerability.
To mitigate CVE-2013-2102, you should upgrade Red Hat JBoss Portal to version 6.1.0 or later.
CVE-2013-2102 affects multiple versions of Red Hat JBoss Portal, including versions before 6.1.0 and specific 4.x and 5.x releases.
CVE-2013-2102 is a remote information disclosure vulnerability due to unauthenticated access to the JGroups diagnostics service.
Yes, CVE-2013-2102 can be exploited remotely, allowing attackers to access sensitive diagnostics information.