A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2023:5484 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:5485 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:5486 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:5488 | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2023-4061 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2228608 | Issue Tracking |
https://access.redhat.com/errata/RHSA-2023:5484 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:5485 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:5486 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:5488 | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2023-4061 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2228608 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 08:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2023:5484 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:5485 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:5486 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:5488 - Vendor Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2023-4061 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2228608 - Issue Tracking |
16 Nov 2023, 16:03
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Redhat enterprise Linux
Redhat jboss Enterprise Application Platform Redhat wildfly Core Redhat |
|
CPE | cpe:2.3:a:redhat:wildfly_core:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://access.redhat.com/errata/RHSA-2023:5488 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2228608 - Issue Tracking | |
References | () https://access.redhat.com/errata/RHSA-2023:5486 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:5484 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:5485 - Vendor Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2023-4061 - Vendor Advisory |
08 Nov 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-08 01:15
Updated : 2024-11-21 08:34
NVD link : CVE-2023-4061
Mitre link : CVE-2023-4061
CVE.ORG link : CVE-2023-4061
JSON object : View
Products Affected
redhat
- wildfly_core
- enterprise_linux
- jboss_enterprise_application_platform
CWE