First published: Tue Jul 27 2010(Updated: )
The JBoss Seam Framework is an application framework for building web<br>applications in Java.<br>An input sanitization flaw was found in the way JBoss Seam processed<br>certain parametrized JBoss Expression Language (EL) expressions. A remote<br>attacker could use this flaw to execute arbitrary code via a URL,<br>containing appended, specially-crafted expression language parameters,<br>provided to certain applications based on the JBoss Seam framework. Note: A<br>properly configured and enabled Java Security Manager would prevent<br>exploitation of this flaw. (CVE-2010-1871)<br>Red Hat would like to thank Meder Kydyraliev of the Google Security Team<br>for responsibly reporting this issue.<br>Users of jboss-seam2 should upgrade to these updated packages, which<br>contain a backported patch to correct this issue. The JBoss server process<br>must be restarted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jboss-seam2 | <2.0.2.FP-1.ep1.24.el5 | 2.0.2.FP-1.ep1.24.el5 |
redhat/jboss-seam2 | <2.0.2.FP-1.ep1.24.el5 | 2.0.2.FP-1.ep1.24.el5 |
redhat/jboss-seam2-docs | <2.0.2.FP-1.ep1.24.el5 | 2.0.2.FP-1.ep1.24.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0564 is classified as important.
To fix RHSA-2010:0564, you should update to the version 2.0.2.FP-1.ep1.24.el5 of JBoss Seam.
The vulnerability in RHSA-2010:0564 is an input sanitization flaw in JBoss Seam's processing of certain EL expressions.
Users of JBoss Seam versions prior to 2.0.2.FP-1.ep1.24.el5 are affected by RHSA-2010:0564.
Yes, the input sanitization flaw in RHSA-2010:0564 could allow a remote attacker to execute arbitrary code.