First published: Tue May 09 2017(Updated: )
Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules.<br>This release of Red Hat JBoss BRMS 6.4.3 serves as a replacement for Red Hat JBoss BRMS 6.4.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> JBoss BRMS 6 and BPM Suite 6 are vulnerable to a stored XSS via several lists in Business Central. The flaw is due to lack of sanitation of user input when creating new lists. Remote, authenticated attackers that have privileges to create lists can store scripts in them, which are not properly sanitized before showing to other users, including admins. (CVE-2017-2674)</li> <li> JBoss BRMS 6 and BPM Suite 6 are vulnerable to a reflected XSS via artifact upload. A malformed XML file, if uploaded, causes an error message to appear that includes part of the bad XML code verbatim without filtering out scripts. Successful exploitation would allow execution of script code within the context of the affected user. (CVE-2017-7463)</li> Red Hat would like to thank Chris Hebert, Vikas Pandey, Harold Schliesske, and Ryan Stanley (Noblis) for reporting these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise BRMS Platform | <6.4.3 | |
Red Hat JBoss BPM Suite | <6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2017:1217 is classified as moderate.
To fix RHSA-2017:1217, you should update your Red Hat JBoss BRMS to version 6.4.3 or later.
RHSA-2017:1217 affects Red Hat JBoss BRMS up to version 6.4.3 and Red Hat BPM Suite 6.
RHSA-2017:1217 was released as an advisory on a specific date in the year 2017.
RHSA-2017:1217 includes bug fixes and enhancements for Red Hat JBoss BRMS.