It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-1097.html | Third Party Advisory |
http://www.securityfocus.com/bid/97964 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2638 | Issue Tracking Patch Third Party Advisory |
https://github.com/infinispan/infinispan/pull/4936/commits | Patch Third Party Advisory |
https://issues.jboss.org/browse/ISPN-7485 | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2017-1097.html | Third Party Advisory |
http://www.securityfocus.com/bid/97964 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2638 | Issue Tracking Patch Third Party Advisory |
https://github.com/infinispan/infinispan/pull/4936/commits | Patch Third Party Advisory |
https://issues.jboss.org/browse/ISPN-7485 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2017-1097.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/97964 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2638 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/infinispan/infinispan/pull/4936/commits - Patch, Third Party Advisory | |
References | () https://issues.jboss.org/browse/ISPN-7485 - Third Party Advisory |
Information
Published : 2018-07-16 13:29
Updated : 2024-11-21 03:23
NVD link : CVE-2017-2638
Mitre link : CVE-2017-2638
CVE.ORG link : CVE-2017-2638
JSON object : View
Products Affected
infinispan
- infinispan
redhat
- jboss_data_grid