First published: Wed Jan 08 2014(Updated: )
IssueDescription: It was identified that PicketBox/JBossSX allowed any deployed application to alter or read the underlying application server configuration and state without any authorization checks. An attacker able to deploy applications could use this flaw to circumvent security constraints applied to other applications deployed on the same system, disclose privileged information, and in certain cases allow arbitrary code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =6.2.2 | |
Red Hat JBoss Enterprise BRMS Platform | <=6.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0005 is classified as a high-severity vulnerability due to the potential for unauthorized access to server configurations.
To fix CVE-2014-0005, apply the necessary patches provided by Red Hat for affected versions of JBoss Enterprise Application Platform and JBoss BRMS Platform.
CVE-2014-0005 affects Red Hat JBoss Enterprise Application Platform version 6.2.2 and JBoss Enterprise BRMS Platform versions up to 6.0.3.
CVE-2014-0005 can be exploited to allow unauthorized applications to read or alter the application server's configuration.
Yes, CVE-2014-0005 is a remote vulnerability that can be exploited by an attacker with the ability to deploy applications on the server.