CVE-2017-7536

In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().
References
Link Resource
http://www.securityfocus.com/bid/101048 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039744 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2808 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2809 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2810 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2811 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3141 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3454 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3455 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3456 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3458 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2740 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2741 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2742 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2743 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2927 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:3817 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1465573 Issue Tracking Vendor Advisory
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
http://www.securityfocus.com/bid/101048 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039744 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2808 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2809 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2810 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2811 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3141 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3454 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3455 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3456 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3458 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2740 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2741 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2742 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2743 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2927 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:3817 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1465573 Issue Tracking Vendor Advisory
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:hibernate_validator:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:hibernate_validator:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:hibernate_validator:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:satellite:6.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite_capsule:6.4:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:32

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/101048 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101048 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039744 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039744 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:2808 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:2808 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:2809 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:2809 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:2810 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:2810 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:2811 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:2811 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3141 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3141 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3454 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3454 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3455 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3455 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3456 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3456 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3458 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3458 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:2740 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:2740 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:2741 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:2741 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:2742 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:2742 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:2743 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:2743 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:2927 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:2927 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:3817 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3817 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1465573 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1465573 - Issue Tracking, Vendor Advisory
References () https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E - () https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E -

07 Nov 2023, 02:50

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'name': '[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities', 'tags': ['Issue Tracking', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E -

Information

Published : 2018-01-10 15:29

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7536

Mitre link : CVE-2017-7536

CVE.ORG link : CVE-2017-7536


JSON object : View

Products Affected

redhat

  • satellite_capsule
  • enterprise_linux
  • virtualization
  • satellite
  • jboss_enterprise_application_platform
  • hibernate_validator
  • virtualization_host
CWE
CWE-592

DEPRECATED: Authentication Bypass Issues

CWE-470

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')