First published: Tue Sep 17 2019(Updated: )
A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-wildfly-elytron | <0:1.6.4-3.Final_redhat_00002.1.el6ea | 0:1.6.4-3.Final_redhat_00002.1.el6ea |
redhat/eap7-apache-cxf | <0:3.2.10-1.redhat_00001.1.el6ea | 0:3.2.10-1.redhat_00001.1.el6ea |
redhat/eap7-byte-buddy | <0:1.9.11-1.redhat_00002.1.el6ea | 0:1.9.11-1.redhat_00002.1.el6ea |
redhat/eap7-glassfish-jsf | <0:2.3.5-5.SP3_redhat_00003.1.el6ea | 0:2.3.5-5.SP3_redhat_00003.1.el6ea |
redhat/eap7-hal-console | <0:3.0.17-2.Final_redhat_00001.1.el6ea | 0:3.0.17-2.Final_redhat_00001.1.el6ea |
redhat/eap7-hibernate | <0:5.3.13-1.Final_redhat_00001.1.el6ea | 0:5.3.13-1.Final_redhat_00001.1.el6ea |
redhat/eap7-ironjacamar | <0:1.4.18-1.Final_redhat_00001.1.el6ea | 0:1.4.18-1.Final_redhat_00001.1.el6ea |
redhat/eap7-jboss-genericjms | <0:2.0.2-1.Final_redhat_00001.1.el6ea | 0:2.0.2-1.Final_redhat_00001.1.el6ea |
redhat/eap7-jboss-msc | <0:1.4.11-1.Final_redhat_00001.1.el6ea | 0:1.4.11-1.Final_redhat_00001.1.el6ea |
redhat/eap7-jboss-remoting | <0:5.0.16-2.Final_redhat_00001.1.el6ea | 0:5.0.16-2.Final_redhat_00001.1.el6ea |
redhat/eap7-jboss-server-migration | <0:1.3.1-6.Final_redhat_00006.1.el6ea | 0:1.3.1-6.Final_redhat_00006.1.el6ea |
redhat/eap7-jboss-xnio-base | <0:3.7.6-2.SP1_redhat_00001.1.el6ea | 0:3.7.6-2.SP1_redhat_00001.1.el6ea |
redhat/eap7-picketbox | <0:5.0.3-6.Final_redhat_00005.1.el6ea | 0:5.0.3-6.Final_redhat_00005.1.el6ea |
redhat/eap7-picketlink-bindings | <0:2.5.5-20.SP12_redhat_00009.1.el6ea | 0:2.5.5-20.SP12_redhat_00009.1.el6ea |
redhat/eap7-picketlink-federation | <0:2.5.5-20.SP12_redhat_00009.1.el6ea | 0:2.5.5-20.SP12_redhat_00009.1.el6ea |
redhat/eap7-resteasy | <0:3.6.1-7.SP7_redhat_00001.1.el6ea | 0:3.6.1-7.SP7_redhat_00001.1.el6ea |
redhat/eap7-undertow | <0:2.0.26-2.SP3_redhat_00001.1.el6ea | 0:2.0.26-2.SP3_redhat_00001.1.el6ea |
redhat/eap7-wildfly | <0:7.2.5-4.GA_redhat_00002.1.el6ea | 0:7.2.5-4.GA_redhat_00002.1.el6ea |
redhat/eap7-wildfly-elytron | <0:1.6.5-1.Final_redhat_00001.1.el6ea | 0:1.6.5-1.Final_redhat_00001.1.el6ea |
redhat/eap7-wildfly-elytron-tool | <0:1.4.4-1.Final_redhat_00001.1.el6ea | 0:1.4.4-1.Final_redhat_00001.1.el6ea |
redhat/eap7-wildfly-http-client | <0:1.0.17-1.Final_redhat_00001.1.el6ea | 0:1.0.17-1.Final_redhat_00001.1.el6ea |
redhat/eap7-wildfly-openssl | <0:1.0.8-1.Final_redhat_00001.1.el6ea | 0:1.0.8-1.Final_redhat_00001.1.el6ea |
redhat/eap7-yasson | <0:1.0.5-1.redhat_00001.1.el6ea | 0:1.0.5-1.redhat_00001.1.el6ea |
redhat/eap7-wildfly-elytron | <0:1.6.4-3.Final_redhat_00002.1.el7ea | 0:1.6.4-3.Final_redhat_00002.1.el7ea |
redhat/eap7-apache-cxf | <0:3.2.10-1.redhat_00001.1.el7ea | 0:3.2.10-1.redhat_00001.1.el7ea |
redhat/eap7-byte-buddy | <0:1.9.11-1.redhat_00002.1.el7ea | 0:1.9.11-1.redhat_00002.1.el7ea |
redhat/eap7-glassfish-jsf | <0:2.3.5-5.SP3_redhat_00003.1.el7ea | 0:2.3.5-5.SP3_redhat_00003.1.el7ea |
redhat/eap7-hal-console | <0:3.0.17-2.Final_redhat_00001.1.el7ea | 0:3.0.17-2.Final_redhat_00001.1.el7ea |
redhat/eap7-hibernate | <0:5.3.13-1.Final_redhat_00001.1.el7ea | 0:5.3.13-1.Final_redhat_00001.1.el7ea |
redhat/eap7-ironjacamar | <0:1.4.18-1.Final_redhat_00001.1.el7ea | 0:1.4.18-1.Final_redhat_00001.1.el7ea |
redhat/eap7-jboss-genericjms | <0:2.0.2-1.Final_redhat_00001.1.el7ea | 0:2.0.2-1.Final_redhat_00001.1.el7ea |
redhat/eap7-jboss-msc | <0:1.4.11-1.Final_redhat_00001.1.el7ea | 0:1.4.11-1.Final_redhat_00001.1.el7ea |
redhat/eap7-jboss-remoting | <0:5.0.16-2.Final_redhat_00001.1.el7ea | 0:5.0.16-2.Final_redhat_00001.1.el7ea |
redhat/eap7-jboss-server-migration | <0:1.3.1-6.Final_redhat_00006.1.el7ea | 0:1.3.1-6.Final_redhat_00006.1.el7ea |
redhat/eap7-jboss-xnio-base | <0:3.7.6-2.SP1_redhat_00001.1.el7ea | 0:3.7.6-2.SP1_redhat_00001.1.el7ea |
redhat/eap7-picketbox | <0:5.0.3-6.Final_redhat_00005.1.el7ea | 0:5.0.3-6.Final_redhat_00005.1.el7ea |
redhat/eap7-picketlink-bindings | <0:2.5.5-20.SP12_redhat_00009.1.el7ea | 0:2.5.5-20.SP12_redhat_00009.1.el7ea |
redhat/eap7-picketlink-federation | <0:2.5.5-20.SP12_redhat_00009.1.el7ea | 0:2.5.5-20.SP12_redhat_00009.1.el7ea |
redhat/eap7-resteasy | <0:3.6.1-7.SP7_redhat_00001.1.el7ea | 0:3.6.1-7.SP7_redhat_00001.1.el7ea |
redhat/eap7-undertow | <0:2.0.26-2.SP3_redhat_00001.1.el7ea | 0:2.0.26-2.SP3_redhat_00001.1.el7ea |
redhat/eap7-wildfly | <0:7.2.5-4.GA_redhat_00002.1.el7ea | 0:7.2.5-4.GA_redhat_00002.1.el7ea |
redhat/eap7-wildfly-elytron | <0:1.6.5-1.Final_redhat_00001.1.el7ea | 0:1.6.5-1.Final_redhat_00001.1.el7ea |
redhat/eap7-wildfly-elytron-tool | <0:1.4.4-1.Final_redhat_00001.1.el7ea | 0:1.4.4-1.Final_redhat_00001.1.el7ea |
redhat/eap7-wildfly-http-client | <0:1.0.17-1.Final_redhat_00001.1.el7ea | 0:1.0.17-1.Final_redhat_00001.1.el7ea |
redhat/eap7-wildfly-openssl | <0:1.0.8-1.Final_redhat_00001.1.el7ea | 0:1.0.8-1.Final_redhat_00001.1.el7ea |
redhat/eap7-yasson | <0:1.0.5-1.redhat_00001.1.el7ea | 0:1.0.5-1.redhat_00001.1.el7ea |
redhat/eap7-wildfly-elytron | <0:1.6.4-3.Final_redhat_00002.1.el8ea | 0:1.6.4-3.Final_redhat_00002.1.el8ea |
redhat/eap7-apache-cxf | <0:3.2.10-1.redhat_00001.1.el8ea | 0:3.2.10-1.redhat_00001.1.el8ea |
redhat/eap7-byte-buddy | <0:1.9.11-1.redhat_00002.1.el8ea | 0:1.9.11-1.redhat_00002.1.el8ea |
redhat/eap7-glassfish-jsf | <0:2.3.5-5.SP3_redhat_00003.1.el8ea | 0:2.3.5-5.SP3_redhat_00003.1.el8ea |
redhat/eap7-hal-console | <0:3.0.17-2.Final_redhat_00001.1.el8ea | 0:3.0.17-2.Final_redhat_00001.1.el8ea |
redhat/eap7-hibernate | <0:5.3.13-1.Final_redhat_00001.1.el8ea | 0:5.3.13-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar | <0:1.4.18-1.Final_redhat_00001.1.el8ea | 0:1.4.18-1.Final_redhat_00001.1.el8ea |
redhat/eap7-jboss-genericjms | <0:2.0.2-1.Final_redhat_00001.1.el8ea | 0:2.0.2-1.Final_redhat_00001.1.el8ea |
redhat/eap7-jboss-msc | <0:1.4.11-1.Final_redhat_00001.1.el8ea | 0:1.4.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-jboss-remoting | <0:5.0.16-2.Final_redhat_00001.1.el8ea | 0:5.0.16-2.Final_redhat_00001.1.el8ea |
redhat/eap7-jboss-server-migration | <0:1.3.1-6.Final_redhat_00006.1.el8ea | 0:1.3.1-6.Final_redhat_00006.1.el8ea |
redhat/eap7-jboss-xnio-base | <0:3.7.6-2.SP1_redhat_00001.1.el8ea | 0:3.7.6-2.SP1_redhat_00001.1.el8ea |
redhat/eap7-picketbox | <0:5.0.3-6.Final_redhat_00005.1.el8ea | 0:5.0.3-6.Final_redhat_00005.1.el8ea |
redhat/eap7-picketlink-bindings | <0:2.5.5-20.SP12_redhat_00009.1.el8ea | 0:2.5.5-20.SP12_redhat_00009.1.el8ea |
redhat/eap7-picketlink-federation | <0:2.5.5-20.SP12_redhat_00009.1.el8ea | 0:2.5.5-20.SP12_redhat_00009.1.el8ea |
redhat/eap7-resteasy | <0:3.6.1-7.SP7_redhat_00001.1.el8ea | 0:3.6.1-7.SP7_redhat_00001.1.el8ea |
redhat/eap7-undertow | <0:2.0.26-2.SP3_redhat_00001.1.el8ea | 0:2.0.26-2.SP3_redhat_00001.1.el8ea |
redhat/eap7-wildfly | <0:7.2.5-4.GA_redhat_00002.1.el8ea | 0:7.2.5-4.GA_redhat_00002.1.el8ea |
redhat/eap7-wildfly-elytron | <0:1.6.5-1.Final_redhat_00001.1.el8ea | 0:1.6.5-1.Final_redhat_00001.1.el8ea |
redhat/eap7-wildfly-elytron-tool | <0:1.4.4-1.Final_redhat_00001.1.el8ea | 0:1.4.4-1.Final_redhat_00001.1.el8ea |
redhat/eap7-wildfly-http-client | <0:1.0.17-1.Final_redhat_00001.1.el8ea | 0:1.0.17-1.Final_redhat_00001.1.el8ea |
redhat/eap7-wildfly-openssl | <0:1.0.8-1.Final_redhat_00001.1.el8ea | 0:1.0.8-1.Final_redhat_00001.1.el8ea |
redhat/eap7-yasson | <0:1.0.5-1.redhat_00001.1.el8ea | 0:1.0.5-1.redhat_00001.1.el8ea |
redhat/rh-sso7-keycloak | <0:4.8.15-1.Final_redhat_00001.1.el6 | 0:4.8.15-1.Final_redhat_00001.1.el6 |
redhat/rh-sso7-keycloak | <0:4.8.15-1.Final_redhat_00001.1.el7 | 0:4.8.15-1.Final_redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:4.8.15-1.Final_redhat_00001.1.el8 | 0:4.8.15-1.Final_redhat_00001.1.el8 |
Redhat Single Sign-on | =7.3 | |
Redhat Jboss Enterprise Application Platform | =7.2.0 | |
Redhat Single Sign-on |
This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)