First published: Thu Jun 21 2018(Updated: )
WildFly Core before version 6.0.0.Alpha3 does not properly validate file paths in .war archives, allowing for the extraction of crafted .war archives to overwrite arbitrary files. This is an instance of the 'Zip Slip' vulnerability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Virtualization | =4.0 | |
Redhat Jboss Enterprise Application Platform | =7.1.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Wildfly Core | <=5.0.0 | |
Redhat Wildfly Core | =6.0.0-alpha1 | |
Redhat Wildfly Core | =6.0.0-alpha2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10862 is a vulnerability in WildFly Core that allows for the extraction of crafted .war archives to overwrite arbitrary files.
The severity of CVE-2018-10862 is high, with a severity value of 5.5.
CVE-2018-10862 impacts WildFly Core before version 6.0.0.Alpha3 and allows for the extraction of crafted .war archives to overwrite arbitrary files.
To fix CVE-2018-10862, upgrade WildFly Core to version 6.0.0.Alpha3 or higher.
You can find more information about CVE-2018-10862 at the following references: [1] [2] [3]