First published: Tue May 27 2014(Updated: )
It was found that org.jboss.seam.web.AuthenticationFilter class implementation used seam logging in an unsafe manner. A remote attacker could exploit this issue in order to gain arbitrary code execution by providing specifically crafted authentication headers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =5.2.0 | |
Red Hat JBoss Enterprise Web Platform | =5.2.0 | |
Red Hat JBoss Web Framework Kit | =2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0248 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2014-0248, upgrade to the latest patched version of Red Hat JBoss Enterprise Application Platform, JBoss Enterprise Web Platform, or JBoss Web Framework Kit.
CVE-2014-0248 affects users of Red Hat JBoss Enterprise Application Platform version 5.2.0, JBoss Enterprise Web Platform version 5.2.0, and JBoss Web Framework Kit version 2.5.0.
CVE-2014-0248 can be exploited by remote attackers who send specially crafted authentication headers to execute arbitrary code.
CVE-2014-0248 was disclosed in 2014, drawing attention to its security impact on affected systems.