Описание
In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted network packet can be used to request the Derby Network Server to boot a database whose location and contents are under the user's control. If the Derby Network Server is not running with a Java Security Manager policy file, the attack is successful. If the server is using a policy file, the policy file must permit the database location to be read for the attack to work. The default Derby Network Server policy file distributed with the affected releases includes a permissive policy as the default Network Server policy, which allows the attack to work.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat BPM Suite 6 | derby | Not affected | ||
| Red Hat Fuse 7 | pax-jdbc-derby | Not affected | ||
| Red Hat JBoss BRMS 5 | derby | Will not fix | ||
| Red Hat JBoss BRMS 6 | derby | Not affected | ||
| Red Hat JBoss Fuse 6 | camel | Not affected | ||
| Red Hat JBoss Fuse Integration Service 2 | derby | Not affected | ||
| Red Hat Single Sign-On 7 | derby | Not affected |
Показывать по
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted network packet can be used to request the Derby Network Server to boot a database whose location and contents are under the user's control. If the Derby Network Server is not running with a Java Security Manager policy file, the attack is successful. If the server is using a policy file, the policy file must permit the database location to be read for the attack to work. The default Derby Network Server policy file distributed with the affected releases includes a permissive policy as the default Network Server policy, which allows the attack to work.
In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted network packet can be used to request the Derby Network Server to boot a database whose location and contents are under the user's control. If the Derby Network Server is not running with a Java Security Manager policy file, the attack is successful. If the server is using a policy file, the policy file must permit the database location to be read for the attack to work. The default Derby Network Server policy file distributed with the affected releases includes a permissive policy as the default Network Server policy, which allows the attack to work.
In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted network pac ...
Уязвимость системы управления базами данных Apache Derby, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
7.5 High
CVSS3