First published: Tue Oct 05 2021(Updated: )
The HornetQ component of Artemis in EAP 7 was not updated with the fix for CVE-2016-4978. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-hornetq | <0:2.4.8-1.Final_redhat_00001.1.el8ea | 0:2.4.8-1.Final_redhat_00001.1.el8ea |
redhat/eap7-hornetq | <0:2.4.8-1.Final_redhat_00001.1.el7ea | 0:2.4.8-1.Final_redhat_00001.1.el7ea |
Redhat Jboss Enterprise Application Platform | =7.3.9-general_availability | |
Redhat Jboss Enterprise Application Platform | =7.4.0-general_availability |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-20318 is a vulnerability in the HornetQ component of Artemis in EAP 7 that allows a remote attacker to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.
CVE-2021-20318 has a severity rating of 7.2, which is classified as high.
CVE-2021-20318 affects Redhat Jboss Enterprise Application Platform versions 7.3.9 and 7.4.0, as well as versions of eap7-hornetq up to 2.4.8-1.Final_redhat_00001.1.el8ea and 2.4.8-1.Final_redhat_00001.1.el7ea.
To fix CVE-2021-20318, it is recommended to update to version 2.4.8-1.Final_redhat_00001.1.el8ea or later for eap7-hornetq, or follow the guidance provided by Red Hat in their RHSA-2022:0404 advisory.
More information about CVE-2021-20318 can be found on the CVE website, NIST National Vulnerability Database, Red Hat Bugzilla, and Red Hat Access website.