Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1051

Опубликовано: 18 янв. 2018
Источник: redhat
CVSS3: 8.1

Описание

It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1.2 was incomplete and Yaml unmarshalling in Resteasy is still possible via Yaml.load() in YamlProvider.

Отчет

This issue only affects applications which have the YamlProvider explicitly enabled by adding or appending a file with the name 'META-INF/services/javax.ws.rs.ext.Providers' to your WAR, or JAR with the contents 'org.jboss.resteasy.plugins.providers.YamlProvider' resteasy-base as shipped in Red Hat Enterprise Linux 7 does not include YamlProvider. Red Hat Subscription Asset Manager version 1 is now in a reduced support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. This issue affects the versions of resteasy as shipped with Red Hat Satellite version 6, however Satellite version 6 does not use the affected functionality. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Меры по смягчению последствий

If the YamlProvider is enabled it's recommended to add authentication, and authorization to the endpoint expecting Yaml content to prevent exploitation of this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6resteasyNot affected
Red Hat Enterprise Linux 7resteasy-baseNot affected
Red Hat Enterprise Linux 8resteasyNot affected
Red Hat JBoss BRMS 6resteasyNot affected
Red Hat JBoss Data Grid 6resteasyOut of support scope
Red Hat JBoss Data Virtualization 6resteasyOut of support scope
Red Hat JBoss Enterprise Application Platform 5resteasyWill not fix
Red Hat JBoss Enterprise Application Platform 6resteasyWill not fix
Red Hat JBoss Enterprise Application Platform 7resteasyWill not fix
Red Hat JBoss Fuse 6resteasyNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1535411resteasy: Unsafe unmarshalling in YamlProvider allows code execution

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 8 лет назад

It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1.2 was incomplete and Yaml unmarshalling in Resteasy is still possible via `Yaml.load()` in YamlProvider.

CVSS3: 8.1
nvd
около 8 лет назад

It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1.2 was incomplete and Yaml unmarshalling in Resteasy is still possible via `Yaml.load()` in YamlProvider.

CVSS3: 8.1
debian
около 8 лет назад

It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1 ...

CVSS3: 8.1
github
больше 3 лет назад

Deserialization of Untrusted Data in org.jboss.resteasy:resteasy-yaml-provider

8.1 High

CVSS3