First published: Thu Jul 17 2014(Updated: )
IssueDescription: It was discovered that the implementation of org.hibernate.validator.util.ReflectionHelper together with the permissions required to run Hibernate Validator under the Java Security Manager could allow a malicious application deployed in the same application container to execute several actions with escalated privileges, which might otherwise not be possible. This flaw could be used to perform various attacks, including but not restricted to, arbitrary code execution in systems that are otherwise secured by the Java Security Manager.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.hibernate:hibernate-validator | >=5.0.0<5.1.2 | 5.1.2 |
maven/org.hibernate:hibernate-validator | >=4.3.0<4.3.2 | 4.3.2 |
maven/org.hibernate:hibernate-validator | >=4.1.0<4.2.1 | 4.2.1 |
Red Hat Hibernate Validator | >=4.3.0<4.3.2 | |
Red Hat Hibernate Validator | >=5.0.0<=5.0.3 | |
Red Hat Hibernate Validator | >=5.1.0<5.1.2 | |
Red Hat Hibernate Validator | =4.1.0 | |
Red Hat Hibernate Validator | =4.2.0 | |
Red Hat Hibernate Validator | =4.2.0-beta1 | |
Red Hat Hibernate Validator | =4.2.0-beta2 | |
Red Hat Hibernate Validator | =4.2.0-cr1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3558 is considered to have a moderate severity level.
To fix CVE-2014-3558, upgrade your Hibernate Validator to version 5.1.2 or 4.3.2 or later.
CVE-2014-3558 affects Hibernate Validator versions prior to 5.1.2 and 4.3.2.
The impact of CVE-2014-3558 could allow a malicious application to execute unauthorized code within the same application container.
Yes, CVE-2014-3558 is related to security vulnerabilities in the Java Security Manager when using Hibernate Validator.