Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-14887

Опубликовано: 12 мар. 2020
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.

A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network.

Меры по смягчению последствий

Avoid using an OpenSSL security provider and instead use the default configuration or regular JSSE provider with 'TLS'.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7wildflyNot affected
Red Hat JBoss Data Grid 7wildflyAffected
Red Hat JBoss Data Virtualization 6jbossasOut of support scope
Red Hat JBoss Data Virtualization 6wildflyOut of support scope
Red Hat JBoss Enterprise Application Platform 5jbossasOut of support scope
Red Hat JBoss Enterprise Application Platform 6jbossasOut of support scope
Red Hat JBoss Fuse 6wildflyOut of support scope
Red Hat JBoss Operations Network 3wildflyOut of support scope
Red Hat JBoss SOA Platform 5jbossasOut of support scope
Red Hat OpenShift Application RuntimeswildflyAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-757
https://bugzilla.redhat.com/show_bug.cgi?id=1772008wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use

EPSS

Процентиль: 39%
0.00177
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 9.1
nvd
почти 6 лет назад

A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.

CVSS3: 9.1
debian
почти 6 лет назад

A flaw was found when an OpenSSL security provider is used with Wildfl ...

CVSS3: 9.1
github
почти 4 года назад

Inadequate Encryption Strength and Algorithm Downgrade in Wildfly

CVSS3: 7.4
fstec
почти 6 лет назад

Уязвимость сервера приложений Wildfly, связанная с недостаточной обработкой исключительных состояний, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

EPSS

Процентиль: 39%
0.00177
Низкий

7.4 High

CVSS3

Уязвимость CVE-2019-14887