Lucene search

K
vulnrichmentRedhatVULNRICHMENT:CVE-2023-4503
HistoryFeb 06, 2024 - 8:39 a.m.

CVE-2023-4503 Eap-galleon: custom provisioning creates unsecured http-invoker

2024-02-0608:39:01
CWE-665
redhat
github.com
4
galleon
eap provisioning
unsecured servers
http services

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

An improper initialization vulnerability was found in Galleon. When using Galleon to provision custom EAP or EAP-XP servers, the servers are created unsecured. This issue could allow an attacker to access remote HTTP services available from the server.

CNA Affected

[
  {
    "cpes": [
      "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
    ],
    "vendor": "Red Hat",
    "product": "EAP 7.4.14",
    "packageName": "eap-galleon",
    "collectionURL": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
    ],
    "vendor": "Red Hat",
    "product": "Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8",
    "versions": [
      {
        "status": "unaffected",
        "version": "0:2.2.28-1.SP1_redhat_00001.1.el8eap",
        "lessThan": "*",
        "versionType": "rpm"
      }
    ],
    "packageName": "eap7-undertow",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
    ],
    "vendor": "Red Hat",
    "product": "Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8",
    "versions": [
      {
        "status": "unaffected",
        "version": "0:7.4.14-5.GA_redhat_00002.1.el8eap",
        "lessThan": "*",
        "versionType": "rpm"
      }
    ],
    "packageName": "eap7-wildfly",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
    ],
    "vendor": "Red Hat",
    "product": "Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9",
    "versions": [
      {
        "status": "unaffected",
        "version": "0:2.2.28-1.SP1_redhat_00001.1.el9eap",
        "lessThan": "*",
        "versionType": "rpm"
      }
    ],
    "packageName": "eap7-undertow",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
    ],
    "vendor": "Red Hat",
    "product": "Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9",
    "versions": [
      {
        "status": "unaffected",
        "version": "0:7.4.14-5.GA_redhat_00002.1.el9eap",
        "lessThan": "*",
        "versionType": "rpm"
      }
    ],
    "packageName": "eap7-wildfly",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
    ],
    "vendor": "Red Hat",
    "product": "Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7",
    "versions": [
      {
        "status": "unaffected",
        "version": "0:2.2.28-1.SP1_redhat_00001.1.el7eap",
        "lessThan": "*",
        "versionType": "rpm"
      }
    ],
    "packageName": "eap7-undertow",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
    ],
    "vendor": "Red Hat",
    "product": "Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7",
    "versions": [
      {
        "status": "unaffected",
        "version": "0:7.4.14-5.GA_redhat_00002.1.el7eap",
        "lessThan": "*",
        "versionType": "rpm"
      }
    ],
    "packageName": "eap7-wildfly",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:/a:redhat:jbosseapxp"
    ],
    "vendor": "Red Hat",
    "product": "Red Hat JBoss Enterprise Application Platform Expansion Pack",
    "packageName": "eap-galleon",
    "collectionURL": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
    "defaultStatus": "affected"
  }
]

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-4503