CVE-2017-2638

It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2017-1097.html Third Party Advisory
http://www.securityfocus.com/bid/97964 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2638 Issue Tracking Patch Third Party Advisory
https://github.com/infinispan/infinispan/pull/4936/commits Patch Third Party Advisory
https://issues.jboss.org/browse/ISPN-7485 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:infinispan:infinispan:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:jboss_data_grid:7.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-07-16 13:29

Updated : 2023-12-10 12:44


NVD link : CVE-2017-2638

Mitre link : CVE-2017-2638

CVE.ORG link : CVE-2017-2638


JSON object : View

Products Affected

infinispan

  • infinispan

redhat

  • jboss_data_grid
CWE
CWE-287

Improper Authentication

CWE-306

Missing Authentication for Critical Function