First published: Mon Oct 24 2016(Updated: )
admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/admin-cli | <3.0.0. | 3.0.0. |
redhat/admin-cli | <2.2.1. | 2.2.1. |
redhat jboss enterprise application platform | =6.4.0 | |
redhat jboss enterprise application platform | =7.0.0 | |
redhat jboss enterprise application platform | =7.1.0 | |
Red Hat Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8627 is considered a moderate severity vulnerability due to its characteristics that could lead to exposure of sensitive log files.
To fix CVE-2016-8627, you should upgrade to admin-cli version 3.0.0.alpha25 or 2.2.1.cr2 or later.
CVE-2016-8627 affects admin-cli versions prior to 3.0.0.alpha25 and 2.2.1.cr2.
CVE-2016-8627 can facilitate cross-origin requests allowing unauthorized access to server log files.
CVE-2016-8627 is related to the use of log downloading features in administrative interfaces that expose sensitive information.