It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2017-1097.html Third Party Advisory
http://www.securityfocus.com/bid/97964 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2638 Issue Tracking Patch Third Party Advisory
https://github.com/infinispan/infinispan/pull/4936/commits Patch Third Party Advisory
https://issues.jboss.org/browse/ISPN-7485 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2018-07-16T13:00:00

Updated: 2018-07-17T09:57:01

Reserved: 2016-12-01T00:00:00


Link: CVE-2017-2638

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-07-16T13:29:00.223

Modified: 2019-10-09T23:27:00.257


Link: CVE-2017-2638

JSON object: View

cve-icon Redhat Information

No data.