First published: Mon Sep 03 2018(Updated: )
The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 does not honour configuration when SSL transport is required. Servers before this version that are configured with the following setting allow clients to create plaintext connections: <transport-config confidentiality="required" trust-in-target="supported"/>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Wildfly | <14.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-14627.
The severity level of CVE-2018-14627 is medium with a score of 5.9.
The affected software is WildFly versions before 14.0.0.
The fix for CVE-2018-14627 is to update WildFly to version 14.0.0 or later.
More information about CVE-2018-14627 can be found at the following references: - https://issues.jboss.org/browse/WFLY-9107 - https://github.com/wildfly/wildfly/pull/10675 - https://access.redhat.com/errata/RHSA-2018:3527