First published: Mon May 21 2012(Updated: )
When a JGroups channel is started, the JGroups diagnostics service will be enabled by default with no authentication. This service is exposed via IP multicast. On JBoss Enterprise Application Platform 6, an attacker on an adjacent network can exploit this flaw to read diagnostics information and invoke JMX operations on the server (limited remote code execution). On other affected JBoss products, an attacker on an adjacent network can exploit this flaw only to read diagnostics information (information disclosure).
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | ||
JBoss |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-823392 is considered high due to the potential for unauthorized access to sensitive diagnostics information.
To fix REDHAT-BUG-823392, disable the JGroups diagnostics service or configure it to require authentication.
REDHAT-BUG-823392 affects JBoss Enterprise Application Platform 6 and other JBoss products using JGroups.
Yes, an attacker on an adjacent network can exploit REDHAT-BUG-823392 to access JGroups diagnostics information.
If REDHAT-BUG-823392 is not addressed, it can lead to information disclosure and potential network-level attacks.