The HTTP and WebSocket engine components in the server in Kaazing Gateway before 4.5.3 hotfix-1, Gateway - JMS Edition before 4.0.5 hotfix-15, 4.0.6 before hotfix-4, 4.0.7, 4.0.9 before hotfix-19, 4.4.x before 4.4.2 hotfix-1, 4.5.x before 4.5.3 hotfix-1, and Gateway Community and Enterprise Editions before 5.6.0 allow remote attackers to bypass intended access restrictions and obtain sensitive information via vectors related to HTTP request handling.
References
Link | Resource |
---|---|
https://support.kaazing.com/hc/en-us/articles/115004752368 | Mitigation Vendor Advisory |
https://support.kaazing.com/hc/en-us/articles/115004752368 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.kaazing.com/hc/en-us/articles/115004752368 - Mitigation, Vendor Advisory |
Information
Published : 2018-04-12 15:29
Updated : 2024-11-21 03:30
NVD link : CVE-2017-6910
Mitre link : CVE-2017-6910
CVE.ORG link : CVE-2017-6910
JSON object : View
Products Affected
kaazing
- kaazing_gateway
tenefit
- kaazing_websocket_gateway
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor