First published: Thu Mar 02 2017(Updated: )
It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.infinispan:infinispan-server-core | <9.0.0 | 9.0.0 |
redhat/Infinispan | <9.0.0. | 9.0.0. |
Infinispan Infinispan | <9.0.0 | |
Red Hat JBoss Data Grid | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-2638 is classified as medium, as it allows unauthorized access to sensitive data.
To fix CVE-2017-2638, upgrade to Infinispan version 9.0.0 or later.
CVE-2017-2638 affects Infinispan versions prior to 9.0.0 and Red Hat JBoss Data Grid version 7.1.
The impact of CVE-2017-2638 is that an attacker could read or modify data in the default cache without authentication.
No, authentication is not properly enforced in the REST API of Infinispan prior to version 9.0.0.