{
  "threat_severity" : "Moderate",
  "public_date" : "2016-08-31T00:00:00Z",
  "bugzilla" : {
    "description" : "JON3: privilege escalation via improper authorization",
    "id" : "1361933",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1361933"
  },
  "cvss" : {
    "cvss_base_score" : "6.5",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "9.9",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-285",
  "details" : [ "The web console in Red Hat JBoss Operations Network (JON) before 3.3.7 does not properly authorize requests to add users with the super user role, which allows remote authenticated users to gain admin privileges via a crafted POST request.", "It was found that JBoss Operations Network allowed regular users to add a new super user by sending a specially crafted request to the web console. This attacks allows escalation of privileges." ],
  "acknowledgement" : "This issue was discovered by Jeremy Choi (Red Hat Product Security Team).",
  "affected_release" : [ {
    "product_name" : "Red Hat JBoss Operations Network 3.3",
    "release_date" : "2016-08-31T00:00:00Z",
    "advisory" : "RHSA-2016:1785",
    "cpe" : "cpe:/a:redhat:jboss_operations_network:3.3",
    "package" : "Security"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-5422\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-5422" ],
  "name" : "CVE-2016-5422",
  "csaw" : false
}