First published: Thu Mar 20 2014(Updated: )
JBoss Seam response envelopes include unsanitized parameter and id names provided in the request. This allows a request to inject arbitrary XML into the response. A remote attacker could use this flaw to perform reflected cross-site scripting attacks, provided the JBoss Seam remoting application does not apply any cross-site request forgery (CSRF) protection.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jboss-seam-remoting 2.3.3.Final-redhat | <2 | 2 |
Red Hat JBoss Web Framework Kit | =2.5.0 | |
=2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0149 has a high severity rating due to its potential for reflected cross-site scripting attacks.
To fix CVE-2014-0149, it's recommended to upgrade the affected JBoss Seam remoting package to a version that addresses this vulnerability.
CVE-2014-0149 affects JBoss Seam remoting versions prior to 2.3.3.Final-redhat and the Red Hat JBoss Web Framework Kit version 2.5.0.
Yes, CVE-2014-0149 can be exploited remotely by attackers to inject arbitrary XML into the response.
CVE-2014-0149 can facilitate reflected cross-site scripting (XSS) attacks against users of vulnerable applications.