The HTTP and WebSocket engine components in the server in Kaazing Gateway 4.0.2, 4.0.3, and 4.0.4 and Gateway - JMS Edition 4.0.2, 4.0.3, and 4.0.4 allow remote attackers to obtain sensitive information via vectors related to HTTP request handling.
References
Link | Resource |
---|---|
https://support.kaazing.com/hc/en-us/articles/115004550547-Advisory-for-KGS-879 | Broken Link Vendor Advisory |
https://support.tenefit.com/hc/en-us/articles/115004550547-Advisory-for-KGS-879 | Vendor Advisory |
https://support.kaazing.com/hc/en-us/articles/115004550547-Advisory-for-KGS-879 | Broken Link Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.kaazing.com/hc/en-us/articles/115004550547-Advisory-for-KGS-879 - Broken Link, Vendor Advisory |
Information
Published : 2018-04-12 15:29
Updated : 2024-11-21 02:14
NVD link : CVE-2014-6309
Mitre link : CVE-2014-6309
CVE.ORG link : CVE-2014-6309
JSON object : View
Products Affected
tenefit
- kaazing_websocket_gateway
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor