Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-14299

Опубликовано: 13 окт. 2020
Источник: redhat
CVSS3: 5.7
EPSS Низкий

Описание

A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2picketboxAffected
Red Hat BPM Suite 6picketboxOut of support scope
Red Hat Data Grid 8picketboxNot affected
Red Hat Decision Manager 7picketboxNot affected
Red Hat Fuse 7picketboxWill not fix
Red Hat JBoss BRMS 6picketboxOut of support scope
Red Hat JBoss Data Grid 7picketboxOut of support scope
Red Hat JBoss Data Virtualization 6picketboxOut of support scope
Red Hat JBoss Enterprise Application Platform 6picketboxOut of support scope
Red Hat JBoss Fuse 6picketboxWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1848533picketbox: JBoss EAP reload to admin-only mode allows authentication bypass

EPSS

Процентиль: 42%
0.00205
Низкий

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 5 лет назад

A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability.

github
больше 3 лет назад

A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability.

EPSS

Процентиль: 42%
0.00205
Низкий

5.7 Medium

CVSS3