It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-1097.html | Third Party Advisory |
http://www.securityfocus.com/bid/97964 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2638 | Issue Tracking Patch Third Party Advisory |
https://github.com/infinispan/infinispan/pull/4936/commits | Patch Third Party Advisory |
https://issues.jboss.org/browse/ISPN-7485 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-07-16T13:00:00
Updated: 2018-07-17T09:57:01
Reserved: 2016-12-01T00:00:00
Link: CVE-2017-2638
JSON object: View
NVD Information
Status : Modified
Published: 2018-07-16T13:29:00.223
Modified: 2019-10-09T23:27:00.257
Link: CVE-2017-2638
JSON object: View
Redhat Information
No data.