Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-8657

Опубликовано: 10 окт. 2016
Источник: redhat
CVSS3: 7.8
CVSS2: 6.9
EPSS Низкий

Описание

It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted.

Отчет

It was found that a variant of the Tomcat CVE-2016-6325 exploit is also applicable to Red Hat JBoss Enterprise Application Platform 5 and 6. CVE-2016-8567 addresses these problems with JBoss EAP. The complexity is high as EAP has many files and configuration options. The issue is now corrected in JBoss Enterprise Application Platform EAP 6.4.14. For further information please refer https://access.redhat.com/articles/3016681

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 7jboss-seam-int-jbossasNot affected
Red Hat JBoss Enterprise Application Platform 5 for RHEL 5jbossasFixedRHSA-2018:160917.05.2018
Red Hat JBoss Enterprise Application Platform 5 for RHEL 6jbossasFixedRHSA-2018:160917.05.2018
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-cxfFixedRHSA-2017:082622.03.2017
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5hornetqFixedRHSA-2017:082622.03.2017
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5infinispanFixedRHSA-2017:082622.03.2017
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5jboss-as-appclientFixedRHSA-2017:082622.03.2017
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5jbossas-appclientFixedRHSA-2017:082622.03.2017
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5jbossas-bundlesFixedRHSA-2017:082622.03.2017
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5jboss-as-cliFixedRHSA-2017:082622.03.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=1400343jboss: jbossas writable config files allow privilege escalation

EPSS

Процентиль: 18%
0.00057
Низкий

7.8 High

CVSS3

6.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
nvd
больше 7 лет назад

It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted.

CVSS3: 7.8
github
больше 3 лет назад

It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted.

EPSS

Процентиль: 18%
0.00057
Низкий

7.8 High

CVSS3

6.9 Medium

CVSS2