Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-14335

Опубликовано: 23 июл. 2018
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7h2Not affected
Red Hat JBoss BRMS 5h2Out of support scope
Red Hat JBoss BRMS 6h2Out of support scope
Red Hat JBoss Data Virtualization 6h2Out of support scope
Red Hat JBoss Enterprise Application Platform 6h2Will not fix
Red Hat JBoss Enterprise Application Platform 7h2Will not fix
Red Hat JBoss Fuse 6h2Out of support scope
Red Hat JBoss Fuse Service Works 6h2Out of support scope
Red Hat JBoss Operations Network 3h2Out of support scope
Red Hat JBoss SOA Platform 5h2Out of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1610877h2: Information Exposure due to insecure handling of permissions in the backup

EPSS

Процентиль: 92%
0.08596
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 7 лет назад

An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.

CVSS3: 6.5
nvd
больше 7 лет назад

An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.

CVSS3: 6.5
github
больше 3 лет назад

An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.

EPSS

Процентиль: 92%
0.08596
Низкий

4.3 Medium

CVSS3