- Issued:
- 2017-12-13
- Updated:
- 2017-12-13
RHSA-2017:3456 - Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update
Synopsis
Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update
Type/Severity
Security Advisory Important
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.
This release of Red Hat JBoss Enterprise Application Platform 7.1.0 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
-
A Denial of Service can be caused when a long request is sent to EAP 7. (CVE-2016-7046)
-
World executable permission on bin/jboss-cli after installation. Any users of the system could cause harm, or shutdown the running instance. (CVE-2016-7066)
-
A deserialization vulnerability via readValue method of ObjectMapper which allows arbitrary code execution. (CVE-2017-7525)
-
JMSObjectMessage deserializes potentially malicious objects allowing Remote Code Execution. (CVE-2016-4978)
-
Undertow is vulnerable to the injection of arbitrary HTTP headers, and also response splitting. (CVE-2016-4993)
-
The domain controller will not propagate its administrative RBAC configuration to some slaves leading to escalate their privileges. (CVE-2016-5406)
-
Internal IP address disclosed on redirect when request header Host field is not set. (CVE-2016-6311)
-
Potential EAP resource starvation DOS attack via GET requests for server log files. (CVE-2016-8627)
-
Inefficient Header Cache could cause denial of service. (CVE-2016-9589)
-
The log file viewer allows arbitrary file read to authenticated user via path traversal. (CVE-2017-2595)
-
HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests. (CVE-2017-2666)
-
Websocket non clean close can cause IO thread to get stuck in a loop. (CVE-2017-2670)
-
Privilege escalation with security manager's reflective permissions when granted to Hibernate Validator. (CVE-2017-7536)
-
Potential http request smuggling as Undertow parses the http headers with unusual whitespaces. (CVE-2017-7559)
-
Properties based files of the management and the application realm are world readable allowing access to users and roles information to all the users logged in to the system. (CVE-2017-12167)
-
RBAC configuration allows users with a Monitor role to view the sensitive information. (CVE-2016-7061)
-
Improper whitespace parsing leading to potential HTTP request smuggling. (CVE-2017-12165)
Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525; Calum Hutton (NCC Group) and Mikhail Egorov (Odin) for reporting CVE-2016-4993; Luca Bueti for reporting CVE-2016-6311; Gabriel Lavoie (Halogen Software) for reporting CVE-2016-9589; and Gregory Ramsperger and Ryan Moak for reporting CVE-2017-2670. The CVE-2016-5406 issue was discovered by Tomaz Cerar (Red Hat); the CVE-2016-8627 issue was discovered by Darran Lofthouse (Red Hat) and Brian Stansberry (Red Hat); the CVE-2017-2666 issue was discovered by Radim Hatlapatka (Red Hat); the CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat); the CVE-2017-7559 and CVE-2017-12165 issues were discovered by Stuart Douglas (Red Hat); and the CVE-2017-12167 issue was discovered by Brian Stansberry (Red Hat) and Jeremy Choi (Red Hat). Upstream acknowledges WildFly as the original reporter of CVE-2016-6311.
Solution
Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.
The References section of this erratum contains a download link (you must log in to download the update).
Affected Products
| Product | Version | Arch |
|---|---|---|
| JBoss Enterprise Application Platform | Text-Only Advisories | x86_64 |
Fixes
- This content is not included.BZ - 1344321
- This content is not included.BZ - 1359014
- This content is not included.BZ - 1362735
- This content is not included.BZ - 1376646
- This content is not included.BZ - 1379207
- This content is not included.BZ - 1380852
- This content is not included.BZ - 1388240
- This content is not included.BZ - 1401661
- This content is not included.BZ - 1404782
- This content is not included.BZ - 1413028
- This content is not included.BZ - 1436163
- This content is not included.BZ - 1438885
- This content is not included.BZ - 1462702
- This content is not included.BZ - 1465573
- This content is not included.BZ - 1481665
- This content is not included.BZ - 1490301
- This content is not included.BZ - 1491612
CVEs
- CVE-2016-4978
- CVE-2016-4993
- CVE-2016-5406
- CVE-2016-6311
- CVE-2016-7046
- CVE-2016-7061
- CVE-2016-7066
- CVE-2016-8627
- CVE-2016-9589
- CVE-2017-2595
- CVE-2017-2666
- CVE-2017-2670
- CVE-2017-7525
- CVE-2017-7536
- CVE-2017-7559
- CVE-2017-12165
- CVE-2017-12167
References
- https://access.redhat.com/security/updates/classification/#important
- This content is not included.This content is not included.https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=appplatform&version=7.1
- This content is not included.This content is not included.https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/version-7.1
- https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.