First published: Mon May 26 2014(Updated: )
It was found that the implementation of GTNSubjectCreatingInterceptor class in gatein-wsrp was not thread safe. For a specific WSRP endpoint, under high-concurrency scenarios or scenarios where SOAP messages take long to execute, it is possible for an unauthenticated remote attacker to gain privileged information if WS-Security is enabled for the WSRP Consumer and the endpoint in question is being used by a privileged user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gatein-wsrp-2.3.1.Final-prod | <1 | 1 |
Red Hat JBoss Portal | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0245 is classified as a medium severity vulnerability, potentially allowing unauthorized access under specific conditions.
To mitigate CVE-2014-0245, update the affected gatein-wsrp package to a version that addresses the thread safety issues.
CVE-2014-0245 affects Red Hat's gatein-wsrp version 2.3.1.Final-prod and JBoss Portal version 6.2.0.
Yes, CVE-2014-0245 can be exploited by unauthenticated remote attackers in high-concurrency environments.
The impact of CVE-2014-0245 includes the potential for privilege escalation and unauthorized actions on the affected system.