First published: Thu Jul 15 2021(Updated: )
These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base, so no changes to the EAP XP2 code base.<br>Security Fix(es):<br><li> velocity: arbitrary code execution when attacker is able to modify templates (CVE-2020-13936)</li> <li> bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible (CVE-2020-28052)</li> <li> bouncycastle: Timing issue within the EC math library (CVE-2020-15522)</li> <li> undertow: Possible regression in fix for CVE-2020-10687 (CVE-2021-20220)</li> <li> wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client (CVE-2021-20250)</li> <li> netty: Information disclosure via the local system temporary directory (CVE-2021-21290)</li> <li> netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)</li> <li> netty: Request smuggling via content-length header (CVE-2021-21409)</li> <li> wildfly: XSS via admin console when creating roles in domain mode (CVE-2021-3536)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.