The User Manager service in Apache Jetspeed before 2.3.1 does not properly restrict access using Jetspeed Security, which allows remote attackers to (1) add, (2) edit, or (3) delete users via the REST API.
References
Configurations
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and - | |
References | () http://mail-archives.apache.org/mod_mbox/portals-jetspeed-user/201603.mbox/%3CB9165E38-F3D8-496D-8642-8A53FCAC736A%40gmail.com%3E - Vendor Advisory | |
References | () https://portals.apache.org/jetspeed-2/security-reports.html#CVE-2016-2171 - Patch, Vendor Advisory |
Information
Published : 2016-04-11 14:59
Updated : 2024-11-21 02:47
NVD link : CVE-2016-2171
Mitre link : CVE-2016-2171
CVE.ORG link : CVE-2016-2171
JSON object : View
Products Affected
apache
- jetspeed
CWE
CWE-264
Permissions, Privileges, and Access Controls