CVE-2017-6910

The HTTP and WebSocket engine components in the server in Kaazing Gateway before 4.5.3 hotfix-1, Gateway - JMS Edition before 4.0.5 hotfix-15, 4.0.6 before hotfix-4, 4.0.7, 4.0.9 before hotfix-19, 4.4.x before 4.4.2 hotfix-1, 4.5.x before 4.5.3 hotfix-1, and Gateway Community and Enterprise Editions before 5.6.0 allow remote attackers to bypass intended access restrictions and obtain sensitive information via vectors related to HTTP request handling.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kaazing:kaazing_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:hotfix1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:kaazing:kaazing_gateway:*:hotfix1:*:*:jms:*:*:*
cpe:2.3:a:kaazing:kaazing_gateway:*:*:*:*:jms:*:*:*
cpe:2.3:a:kaazing:kaazing_gateway:4.0.5:*:*:*:jms:*:*:*
cpe:2.3:a:kaazing:kaazing_gateway:4.0.6:*:*:*:jms:*:*:*
cpe:2.3:a:kaazing:kaazing_gateway:4.0.6:hotfix2:*:*:jms:*:*:*
cpe:2.3:a:kaazing:kaazing_gateway:4.0.7:*:*:*:jms:*:*:*
cpe:2.3:a:kaazing:kaazing_gateway:4.4.2:hotfix1:*:*:jms:*:*:*
cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:hotfix1:*:*:jms:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:tenefit:kaazing_websocket_gateway:*:*:*:*:community:*:*:*
cpe:2.3:a:tenefit:kaazing_websocket_gateway:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 03:30

Type Values Removed Values Added
References () https://support.kaazing.com/hc/en-us/articles/115004752368 - Mitigation, Vendor Advisory () https://support.kaazing.com/hc/en-us/articles/115004752368 - Mitigation, Vendor Advisory

Information

Published : 2018-04-12 15:29

Updated : 2024-11-21 03:30


NVD link : CVE-2017-6910

Mitre link : CVE-2017-6910

CVE.ORG link : CVE-2017-6910


JSON object : View

Products Affected

kaazing

  • kaazing_gateway

tenefit

  • kaazing_websocket_gateway
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor