Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Jboss_fuse
(Redhat)Repositories |
• https://github.com/hawtio/hawtio
• https://github.com/jboss-fuse/fuse |
#Vulnerabilities | 41 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-02-11 | CVE-2020-1717 | A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack. | Jboss_fuse, Keycloak, Openshift_application_runtimes, Single_sign\-On | 2.7 | ||
2020-04-21 | CVE-2020-1757 | A flaw was found in all undertow-2.x.x SP1 versions prior to undertow-2.0.30.SP1, all undertow-1.x.x and undertow-2.x.x versions prior to undertow-2.1.0.Final, where the Servlet container causes servletPath to normalize incorrectly by truncating the path after semicolon which may lead to an application mapping resulting in the security bypass. | Jboss_data_grid, Jboss_enterprise_application_platform, Jboss_fuse, Openshift_application_runtimes, Single_sign\-On, Undertow | N/A | ||
2019-12-20 | CVE-2016-1000229 | swagger-ui has XSS in key names | Jboss_fuse, Openshift, Swagger\-Ui | N/A | ||
2018-07-26 | CVE-2017-2589 | It was discovered that the hawtio servlet 1.4 uses a single HttpClient instance to proxy requests with a persistent cookie store (cookies are stored locally and are not passed between the client and the end URL) which means all clients using that proxy are sharing the same cookies. | Hawtio, Jboss_fuse | 9.0 | ||
2018-04-18 | CVE-2017-12196 | undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server. | Jboss_enterprise_application_platform, Jboss_fuse, Undertow, Virtualization | 5.9 | ||
2015-07-08 | CVE-2014-8175 | Red Hat JBoss Fuse before 6.2.0 allows remote authenticated users to bypass intended restrictions and access the HawtIO console by leveraging an account defined in the users.properties file. | Jboss_fuse | N/A | ||
2014-10-25 | CVE-2014-5075 | The Ignite Realtime Smack XMPP API 4.x before 4.0.2, and 3.x and 2.x when a custom SSLContext is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | Smack_api, Jboss_fuse | N/A | ||
2017-12-29 | CVE-2014-0121 | The admin terminal in Hawt.io does not require authentication, which allows remote attackers to execute arbitrary commands via the k parameter. | Hawtio, Jboss_fuse | 9.8 | ||
2017-12-29 | CVE-2014-0120 | Cross-site request forgery (CSRF) vulnerability in the admin terminal in Hawt.io allows remote attackers to hijack the authentication of arbitrary users for requests that run commands on the Karaf server, as demonstrated by running "shutdown -f." | Hawtio, Jboss_fuse | 8.8 | ||
2014-04-17 | CVE-2014-0085 | JBoss Fuse did not enable encrypted passwords by default in its usage of Apache Zookeeper. This permitted sensitive information disclosure via logging to local users. Note: this description has been updated; previous text mistakenly identified the source of the flaw as Zookeeper. Previous text: Apache Zookeeper logs cleartext admin passwords, which allows local users to obtain sensitive information by reading the log. | Jboss_a\-Mq, Jboss_fuse | N/A |