CVE-2020-14307

A vulnerability was found in Wildfly's Enterprise Java Beans (EJB) versions shipped with Red Hat JBoss EAP 7, where SessionOpenInvocations are never removed from the remote InvocationTracker after a response is received in the EJB Client, as well as the server. This flaw allows an attacker to craft a denial of service attack to make the service unavailable.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14307 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:amq:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform_continuous_delivery:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*

History

04 Nov 2021, 16:01

Type Values Removed Values Added
CWE CWE-400 CWE-404

Information

Published : 2020-07-24 16:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-14307

Mitre link : CVE-2020-14307

CVE.ORG link : CVE-2020-14307


JSON object : View

Products Affected

redhat

  • openshift_application_runtimes
  • single_sign-on
  • jboss_fuse
  • jboss_enterprise_application_platform_continuous_delivery
  • amq
CWE
CWE-404

Improper Resource Shutdown or Release