First published: Tue Jan 14 2014(Updated: )
IssueDescription: In Red Hat JBoss Enterprise Application Platform, when running under a security manager, it was possible for deployed code to get access to the Modular Service Container (MSC) service registry without any permission checks. This could allow malicious deployments to modify the internal state of the server in various ways.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =6.2.0 | |
Red Hat JBoss WildFly Application Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0018 is considered a medium-level vulnerability due to the potential for unauthorized code to access sensitive registry components.
To fix CVE-2014-0018, it is recommended to upgrade to a version of Red Hat JBoss that includes security updates addressing this vulnerability.
CVE-2014-0018 affects Red Hat JBoss Enterprise Application Platform version 6.2.0 and the Red Hat JBoss WildFly Application Server.
CVE-2014-0018 may allow malicious code to modify the Modular Service Container service registry without proper permission checks, compromising application security.
Yes, CVE-2014-0018 specifically occurs when running Red Hat JBoss under a security manager, where permission checks are bypassed.