Red Hat JBoss EAP version 3.0.7 through before 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100465 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:0002 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0003 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0004 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0005 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0478 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0479 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0480 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0481 - | |
References | () https://issues.jboss.org/browse/RESTEASY-1704 - Patch, Vendor Advisory |
Information
Published : 2017-09-13 17:29
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7561
Mitre link : CVE-2017-7561
CVE.ORG link : CVE-2017-7561
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform