First published: Mon May 25 2015(Updated: )
A flaw was reported in the Undertow module of WildFly that leaks the source code of a JSP page when a trailing slash (/) is added to the end of its URL. This issue did not affect any versions of Red Hat JBoss Enterprise Application Platform because this flaw only affects the Undertow web module; JBoss EAP uses JBoss Web.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.wildfly:wildfly-parent | >=8.1.0.Final<=9.0.0.CR1 | 9.0.0.CR2 |
Red Hat JBoss WildFly Application Server | =9.0.0-beta1 | |
Red Hat JBoss WildFly Application Server | =9.0.0-beta2 | |
Red Hat JBoss WildFly Application Server | =9.0.0-cr1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3198 has a moderate severity level as it can expose source code inadvertently.
To address CVE-2015-3198, upgrade to WildFly version 9.0.0.CR2 or later.
CVE-2015-3198 affects WildFly versions from 8.1.0.Final up to 9.0.0.CR1.
No, CVE-2015-3198 does not affect any versions of Red Hat JBoss Enterprise Application Platform.
CVE-2015-3198 is a source code disclosure vulnerability in the Undertow module of WildFly.