Vulnerabilities > CVE-2018-7489 - Deserialization of Untrusted Data vulnerability in multiple products

047910
CVSS 9.8 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
fasterxml
debian
oracle
redhat
CWE-502
critical
nessus

Summary

FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.

Vulnerable Configurations

Part Description Count
Application
Fasterxml
115
Application
Oracle
3
Application
Redhat
2
OS
Debian
2

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-1451.NASL
    descriptionAn update for jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.19. Security Fix(es) : * jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095) * jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485) * slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088) * Apache ActiveMQ Artemis: Deserialization of untrusted input vulnerability (CVE-2016-4978) * solr: Directory traversal via Index Replication HTTP API (CVE-2017-3163) * tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) * jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries (CVE-2018-7489) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-15095; 0c0c0f from 360Guan Xing Shi Yan Shi for reporting CVE-2017-17485; and Chris McCown for reporting CVE-2018-8088.
    last seen2020-06-01
    modified2020-06-02
    plugin id109838
    published2018-05-16
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/109838
    titleRHEL 6 : eap6-jboss-ec2-eap (RHSA-2018:1451)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2018:1451. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(109838);
      script_version("1.7");
      script_cvs_date("Date: 2019/10/24 15:35:44");
    
      script_cve_id("CVE-2016-4978", "CVE-2017-15095", "CVE-2017-17485", "CVE-2017-3163", "CVE-2018-1304", "CVE-2018-7489", "CVE-2018-8088");
      script_xref(name:"RHSA", value:"2018:1451");
    
      script_name(english:"RHEL 6 : eap6-jboss-ec2-eap (RHSA-2018:1451)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update for jboss-ec2-eap is now available for Red Hat JBoss
    Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6.
    
    Red Hat Product Security has rated this update as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    The jboss-ec2-eap packages provide scripts for Red Hat JBoss
    Enterprise Application Platform running on the Amazon Web Services
    (AWS) Elastic Compute Cloud (EC2).
    
    With this update, the jboss-ec2-eap package has been updated to ensure
    compatibility with Red Hat JBoss Enterprise Application Platform
    6.4.19.
    
    Security Fix(es) :
    
    * jackson-databind: Unsafe deserialization due to incomplete black
    list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)
    
    * jackson-databind: Unsafe deserialization due to incomplete black
    list (incomplete fix for CVE-2017-15095) (CVE-2017-17485)
    
    * slf4j: Deserialisation vulnerability in EventData constructor can
    allow for arbitrary code execution (CVE-2018-8088)
    
    * Apache ActiveMQ Artemis: Deserialization of untrusted input
    vulnerability (CVE-2016-4978)
    
    * solr: Directory traversal via Index Replication HTTP API
    (CVE-2017-3163)
    
    * tomcat: Incorrect handling of empty string URL in security
    constraints can lead to unintended exposure of resources
    (CVE-2018-1304)
    
    * jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe
    serialization via c3p0 libraries (CVE-2018-7489)
    
    For more details about the security issue(s), including the impact, a
    CVSS score, and other related information, refer to the CVE page(s)
    listed in the References section.
    
    Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting
    CVE-2017-15095; 0c0c0f from 360Guan Xing Shi Yan Shi  for reporting
    CVE-2017-17485; and Chris McCown for reporting CVE-2018-8088."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/documentation/en-us/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2018:1451"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-4978"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-3163"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-15095"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-17485"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2018-1304"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2018-7489"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2018-8088"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Update the affected jboss-ec2-eap and / or jboss-ec2-eap-samples
    packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-ec2-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-ec2-eap-samples");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2016/09/27");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/05/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/05/16");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2018:1451";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL6", reference:"jboss-ec2-eap-7.5.20-1.Final_redhat_1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-ec2-eap-samples-7.5.20-1.Final_redhat_1.ep6.el6")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "jboss-ec2-eap / jboss-ec2-eap-samples");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-1449.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.20 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.19, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095) * jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485) * slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088) * Apache ActiveMQ Artemis: Deserialization of untrusted input vulnerability (CVE-2016-4978) * solr: Directory traversal via Index Replication HTTP API (CVE-2017-3163) * tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) * jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries (CVE-2018-7489) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-15095; 0c0c0f from 360Guan Xing Shi Yan Shi for reporting CVE-2017-17485; and Chris McCown for reporting CVE-2018-8088.
    last seen2020-06-01
    modified2020-06-02
    plugin id109906
    published2018-05-18
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/109906
    titleRHEL 6 : JBoss EAP (RHSA-2018:1449)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_93F8E0FFF33D11E8BE460019DBB15B3F.NASL
    descriptionFasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.
    last seen2020-06-01
    modified2020-06-02
    plugin id119272
    published2018-11-29
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119272
    titleFreeBSD : payara -- Default typing issue in Jackson Databind (93f8e0ff-f33d-11e8-be46-0019dbb15b3f)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-1448.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.20 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.19, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095) * jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485) * slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088) * Apache ActiveMQ Artemis: Deserialization of untrusted input vulnerability (CVE-2016-4978) * solr: Directory traversal via Index Replication HTTP API (CVE-2017-3163) * tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) * jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries (CVE-2018-7489) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-15095; 0c0c0f from 360Guan Xing Shi Yan Shi for reporting CVE-2017-17485; and Chris McCown for reporting CVE-2018-8088.
    last seen2020-06-01
    modified2020-06-02
    plugin id109905
    published2018-05-18
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/109905
    titleRHEL 7 : JBoss EAP (RHSA-2018:1448)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-633ACF0ED6.NASL
    descriptionSecurity fix for CVE-2018-7489 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2019-01-03
    plugin id120474
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120474
    titleFedora 28 : jackson-databind (2018-633acf0ed6)
  • NASL familyCGI abuses
    NASL idACTIVEMQ_5_15_5.NASL
    descriptionThe version of Apache ActiveMQ running on the remote host is 5.x prior to 5.15.5. It is, therefore, affected by multiple vulnerabilities.
    last seen2020-06-01
    modified2020-06-02
    plugin id112192
    published2018-08-30
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/112192
    titleApache ActiveMQ 5.x < 5.15.5 Multiple Vulnerabilities
  • NASL familyDatabases
    NASL idORACLE_RDBMS_CPU_OCT_2018.NASL
    descriptionThe remote Oracle Database Server is missing the October 2018 Critical Patch Update (CPU). It is, therefore, affected by multiple vulnerabilities, including remote code execution, as noted in the October 2018 Critical Patch Update advisory. Please consult the CVRF details for the applicable CVEs for additional information. Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-02
    modified2018-10-19
    plugin id118230
    published2018-10-19
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118230
    titleOracle Database Server Multiple Vulnerabilities (October 2018 CPU)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-2089.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.3 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries (CVE-2018-7489) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id110797
    published2018-06-29
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/110797
    titleRHEL 7 : JBoss EAP (RHSA-2018:2089)
  • NASL familyMisc.
    NASL idORACLE_WEBLOGIC_SERVER_CPU_JUL_2018.NASL
    descriptionThe version of Oracle WebLogic Server installed on the remote host is affected by multiple vulnerabilities: - An unspecified vulnerability in the Spring Framework (Sample Apps) subcomponent in Oracle WebLogic allows an unauthenticated, remote attacker to takeover a WebLogic server. (CVE-2018-1275) - An unspecified vulnerability in the WLS Core Components subcomponent in Oracle WebLogic allows an unauthenticated, remote attacker to takeover a WebLogic server. (CVE-2018-2893) - An unspecified vulnerability in the WLS - Web Services subcomponent in Oracle WebLogic allows an unauthenticated, remote attacker with HTTP access to compromise and takeover a WebLogic server. (CVE-2018-2894) In addition, Oracle WebLogic Server is affected by several other lower scoring vulnerabilities in the WLS Core Components, JSF, SAML, and Console (jackson-databind) subcomponents. Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id111209
    published2018-07-20
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111209
    titleOracle WebLogic Server Multiple Vulnerabilities (July 2018 CPU)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4190.NASL
    descriptionIt was discovered that jackson-databind, a Java library used to parse JSON and other data formats, improperly validated user input prior to deserializing because of an incomplete fix for CVE-2017-7525.
    last seen2020-06-01
    modified2020-06-02
    plugin id109557
    published2018-05-04
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/109557
    titleDebian DSA-4190-1 : jackson-databind - security update
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-2090.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.3 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries (CVE-2018-7489) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id110798
    published2018-06-29
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/110798
    titleRHEL 6 : JBoss EAP (RHSA-2018:2090)
  • NASL familyCGI abuses
    NASL idORACLE_PRIMAVERA_GATEWAY_CPU_OCT_2018.NASL
    descriptionAccording to its self-reported version number, the Oracle Primavera Gateway installation running on the remote web server is 15.x prior to 15.2.15, 16.x prior to 16.2.8, or 17.x prior to 17.12.3. It is, therefore, affected by multiple vulnerabilities. Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-04-30
    modified2018-11-02
    plugin id118714
    published2018-11-02
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118714
    titleOracle Primavera Gateway Multiple Vulnerabilities (Oct 2018 CPU)

Redhat

advisories
  • rhsa
    idRHSA-2018:1447
  • rhsa
    idRHSA-2018:1448
  • rhsa
    idRHSA-2018:1449
  • rhsa
    idRHSA-2018:1450
  • rhsa
    idRHSA-2018:1451
  • rhsa
    idRHSA-2018:1786
  • rhsa
    idRHSA-2018:2088
  • rhsa
    idRHSA-2018:2089
  • rhsa
    idRHSA-2018:2090
  • rhsa
    idRHSA-2018:2938
  • rhsa
    idRHSA-2018:2939
  • rhsa
    idRHSA-2019:2858
  • rhsa
    idRHSA-2019:3149
rpms
  • codehaus-jackson-0:1.9.9-12.redhat_6.1.ep6.el7
  • codehaus-jackson-core-asl-0:1.9.9-12.redhat_6.1.ep6.el7
  • codehaus-jackson-jaxrs-0:1.9.9-12.redhat_6.1.ep6.el7
  • codehaus-jackson-mapper-asl-0:1.9.9-12.redhat_6.1.ep6.el7
  • codehaus-jackson-xc-0:1.9.9-12.redhat_6.1.ep6.el7
  • hornetq-0:2.3.25-26.SP24_redhat_1.1.ep6.el7
  • jboss-as-appclient-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-cli-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-client-all-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-clustering-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-cmp-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-configadmin-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-connector-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-controller-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-controller-client-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-core-security-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-deployment-repository-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-deployment-scanner-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-domain-http-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-domain-management-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-ee-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-ee-deployment-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-ejb3-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-embedded-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-host-controller-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jacorb-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jaxr-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jaxrs-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jdr-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jmx-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jpa-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jsf-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jsr77-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-logging-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-mail-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-management-client-content-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-messaging-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-modcluster-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-naming-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-network-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-osgi-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-osgi-configadmin-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-osgi-service-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-picketlink-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-platform-mbean-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-pojo-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-process-controller-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-protocol-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-remoting-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-sar-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-security-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-server-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-system-jmx-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-threads-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-transactions-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-version-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-web-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-webservices-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-weld-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jboss-as-xts-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossas-appclient-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossas-bundles-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossas-core-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossas-domain-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossas-javadocs-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossas-modules-eap-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossas-product-eap-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossas-standalone-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossas-welcome-content-eap-0:7.5.20-1.Final_redhat_1.1.ep6.el7
  • jbossts-1:4.17.43-1.Final_redhat_1.1.ep6.el7
  • jbossweb-0:7.5.28-1.Final_redhat_1.1.ep6.el7
  • jgroups-1:3.2.18-1.Final_redhat_1.1.ep6.el7
  • lucene-solr-0:3.6.2-8.redhat_9.1.ep6.el7
  • picketbox-0:4.1.7-1.Final_redhat_1.1.ep6.el7
  • codehaus-jackson-0:1.9.9-12.redhat_6.1.ep6.el6
  • codehaus-jackson-core-asl-0:1.9.9-12.redhat_6.1.ep6.el6
  • codehaus-jackson-jaxrs-0:1.9.9-12.redhat_6.1.ep6.el6
  • codehaus-jackson-mapper-asl-0:1.9.9-12.redhat_6.1.ep6.el6
  • codehaus-jackson-xc-0:1.9.9-12.redhat_6.1.ep6.el6
  • hornetq-0:2.3.25-26.SP24_redhat_1.1.ep6.el6
  • jboss-as-appclient-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-cli-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-client-all-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-clustering-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-cmp-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-configadmin-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-connector-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-controller-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-controller-client-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-core-security-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-deployment-repository-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-deployment-scanner-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-domain-http-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-domain-management-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-ee-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-ee-deployment-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-ejb3-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-embedded-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-host-controller-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jacorb-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jaxr-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jaxrs-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jdr-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jmx-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jpa-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jsf-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jsr77-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-logging-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-mail-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-management-client-content-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-messaging-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-modcluster-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-naming-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-network-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-osgi-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-osgi-configadmin-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-osgi-service-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-picketlink-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-platform-mbean-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-pojo-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-process-controller-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-protocol-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-remoting-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-sar-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-security-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-server-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-system-jmx-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-threads-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-transactions-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-version-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-web-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-webservices-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-weld-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jboss-as-xts-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossas-appclient-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossas-bundles-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossas-core-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossas-domain-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossas-javadocs-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossas-modules-eap-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossas-product-eap-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossas-standalone-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossas-welcome-content-eap-0:7.5.20-1.Final_redhat_1.1.ep6.el6
  • jbossts-1:4.17.43-1.Final_redhat_1.1.ep6.el6
  • jbossweb-0:7.5.28-1.Final_redhat_1.1.ep6.el6
  • jgroups-1:3.2.18-1.Final_redhat_1.1.ep6.el6
  • lucene-solr-0:3.6.2-8.redhat_9.1.ep6.el6
  • picketbox-0:4.1.7-1.Final_redhat_1.1.ep6.el6
  • codehaus-jackson-0:1.9.9-12.redhat_6.1.ep6.el5
  • codehaus-jackson-core-asl-0:1.9.9-12.redhat_6.1.ep6.el5
  • codehaus-jackson-jaxrs-0:1.9.9-12.redhat_6.1.ep6.el5
  • codehaus-jackson-mapper-asl-0:1.9.9-12.redhat_6.1.ep6.el5
  • codehaus-jackson-xc-0:1.9.9-12.redhat_6.1.ep6.el5
  • hornetq-0:2.3.25-26.SP24_redhat_1.1.ep6.el5
  • jboss-as-appclient-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-cli-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-client-all-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-clustering-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-cmp-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-configadmin-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-connector-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-controller-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-controller-client-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-core-security-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-deployment-repository-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-deployment-scanner-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-domain-http-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-domain-management-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-ee-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-ee-deployment-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-ejb3-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-embedded-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-host-controller-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jacorb-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jaxr-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jaxrs-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jdr-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jmx-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jpa-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jsf-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jsr77-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-logging-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-mail-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-management-client-content-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-messaging-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-modcluster-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-naming-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-network-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-osgi-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-osgi-configadmin-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-osgi-service-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-picketlink-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-platform-mbean-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-pojo-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-process-controller-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-protocol-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-remoting-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-sar-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-security-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-server-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-system-jmx-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-threads-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-transactions-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-version-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-web-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-webservices-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-weld-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jboss-as-xts-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossas-appclient-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossas-bundles-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossas-core-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossas-domain-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossas-javadocs-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossas-modules-eap-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossas-product-eap-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossas-standalone-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossas-welcome-content-eap-0:7.5.20-1.Final_redhat_1.1.ep6.el5
  • jbossts-1:4.17.43-1.Final_redhat_1.1.ep6.el5
  • jbossweb-0:7.5.28-1.Final_redhat_1.1.ep6.el5
  • jgroups-1:3.2.18-1.Final_redhat_1.1.ep6.el5
  • lucene-solr-0:3.6.2-8.redhat_9.1.ep6.el5
  • picketbox-0:4.1.7-1.Final_redhat_1.1.ep6.el5
  • jboss-ec2-eap-0:7.5.20-1.Final_redhat_1.ep6.el6
  • jboss-ec2-eap-samples-0:7.5.20-1.Final_redhat_1.ep6.el6
  • eap7-activemq-artemis-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-cli-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-commons-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-core-client-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-dto-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-hornetq-protocol-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-hqclient-protocol-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-jdbc-store-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-jms-client-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-jms-server-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-journal-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-native-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-ra-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-selector-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-server-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-activemq-artemis-service-extensions-0:1.5.5.012-1.redhat_1.1.ep7.el7
  • eap7-commons-logging-jboss-logmanager-0:1.0.3-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-0:5.1.14-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-core-0:5.1.14-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-entitymanager-0:5.1.14-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-envers-0:5.1.14-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-infinispan-0:5.1.14-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-java8-0:5.1.14-1.Final_redhat_1.1.ep7.el7
  • eap7-infinispan-0:8.2.11-1.Final_redhat_1.1.ep7.el7
  • eap7-infinispan-cachestore-jdbc-0:8.2.11-1.Final_redhat_1.1.ep7.el7
  • eap7-infinispan-cachestore-remote-0:8.2.11-1.Final_redhat_1.1.ep7.el7
  • eap7-infinispan-client-hotrod-0:8.2.11-1.Final_redhat_1.1.ep7.el7
  • eap7-infinispan-commons-0:8.2.11-1.Final_redhat_1.1.ep7.el7
  • eap7-infinispan-core-0:8.2.11-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-0:1.4.9-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-common-api-0:1.4.9-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-common-impl-0:1.4.9-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-common-spi-0:1.4.9-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-core-api-0:1.4.9-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-core-impl-0:1.4.9-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-deployers-common-0:1.4.9-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-jdbc-0:1.4.9-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-validator-0:1.4.9-1.Final_redhat_1.1.ep7.el7
  • eap7-jackson-databind-0:2.8.11.1-1.redhat_1.1.ep7.el7
  • eap7-jackson-jaxrs-base-0:2.8.11-2.redhat_1.1.ep7.el7
  • eap7-jackson-jaxrs-json-provider-0:2.8.11-2.redhat_1.1.ep7.el7
  • eap7-jackson-module-jaxb-annotations-0:2.8.11-2.redhat_1.1.ep7.el7
  • eap7-jboss-logmanager-0:2.0.10-1.Final_redhat_1.1.ep7.el7
  • eap7-jboss-marshalling-0:2.0.5-1.Final_redhat_1.1.ep7.el7
  • eap7-jboss-marshalling-river-0:2.0.5-1.Final_redhat_1.1.ep7.el7
  • eap7-jboss-modules-0:1.6.4-1.Final_redhat_1.1.ep7.el7
  • eap7-jboss-remoting-0:5.0.7-1.Final_redhat_1.1.ep7.el7
  • eap7-jboss-server-migration-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-cli-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-core-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-eap6.4-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-eap6.4-to-eap7.0-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-eap6.4-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-eap7.0-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-eap7.0-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly10.0-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly10.0-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly10.1-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly10.1-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly8.2-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly8.2-to-eap7.0-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly8.2-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly9.0-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly9.0-to-eap7.0-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-jboss-server-migration-wildfly9.0-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el7
  • eap7-picketlink-api-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-picketlink-bindings-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-picketlink-common-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-picketlink-config-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-picketlink-federation-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-picketlink-idm-api-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-picketlink-idm-impl-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-picketlink-idm-simple-schema-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-picketlink-impl-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-picketlink-wildfly8-0:2.5.5-12.SP11_redhat_1.1.ep7.el7
  • eap7-undertow-0:1.4.18-6.SP7_redhat_1.1.ep7.el7
  • eap7-wildfly-0:7.1.3-2.GA_redhat_2.1.ep7.el7
  • eap7-wildfly-elytron-0:1.1.10-1.Final_redhat_1.1.ep7.el7
  • eap7-wildfly-elytron-tool-0:1.0.7-1.Final_redhat_1.1.ep7.el7
  • eap7-wildfly-javadocs-0:7.1.3-1.GA_redhat_2.1.ep7.el7
  • eap7-wildfly-modules-0:7.1.3-2.GA_redhat_2.1.ep7.el7
  • eap7-wildfly-naming-client-0:1.0.8-1.Final_redhat_1.1.ep7.el7
  • eap7-wildfly-openssl-0:1.0.6-1.Final_redhat_1.1.ep7.el7
  • eap7-wildfly-openssl-java-0:1.0.6-1.Final_redhat_1.1.ep7.el7
  • eap7-wildfly-web-console-eap-0:2.9.17-1.Final_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-cli-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-commons-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-core-client-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-dto-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-hornetq-protocol-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-hqclient-protocol-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-jdbc-store-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-jms-client-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-jms-server-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-journal-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-native-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-ra-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-selector-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-server-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-activemq-artemis-service-extensions-0:1.5.5.012-1.redhat_1.1.ep7.el6
  • eap7-commons-logging-jboss-logmanager-0:1.0.3-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-0:5.1.14-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-core-0:5.1.14-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-entitymanager-0:5.1.14-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-envers-0:5.1.14-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-infinispan-0:5.1.14-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-java8-0:5.1.14-1.Final_redhat_1.1.ep7.el6
  • eap7-infinispan-0:8.2.11-1.Final_redhat_1.1.ep7.el6
  • eap7-infinispan-cachestore-jdbc-0:8.2.11-1.Final_redhat_1.1.ep7.el6
  • eap7-infinispan-cachestore-remote-0:8.2.11-1.Final_redhat_1.1.ep7.el6
  • eap7-infinispan-client-hotrod-0:8.2.11-1.Final_redhat_1.1.ep7.el6
  • eap7-infinispan-commons-0:8.2.11-1.Final_redhat_1.1.ep7.el6
  • eap7-infinispan-core-0:8.2.11-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-0:1.4.9-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-common-api-0:1.4.9-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-common-impl-0:1.4.9-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-common-spi-0:1.4.9-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-core-api-0:1.4.9-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-core-impl-0:1.4.9-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-deployers-common-0:1.4.9-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-jdbc-0:1.4.9-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-validator-0:1.4.9-1.Final_redhat_1.1.ep7.el6
  • eap7-jackson-databind-0:2.8.11.1-1.redhat_1.1.ep7.el6
  • eap7-jackson-jaxrs-base-0:2.8.11-2.redhat_1.1.ep7.el6
  • eap7-jackson-jaxrs-json-provider-0:2.8.11-2.redhat_1.1.ep7.el6
  • eap7-jackson-module-jaxb-annotations-0:2.8.11-2.redhat_1.1.ep7.el6
  • eap7-jboss-logmanager-0:2.0.10-1.Final_redhat_1.1.ep7.el6
  • eap7-jboss-marshalling-0:2.0.5-1.Final_redhat_1.1.ep7.el6
  • eap7-jboss-marshalling-river-0:2.0.5-1.Final_redhat_1.1.ep7.el6
  • eap7-jboss-modules-0:1.6.4-1.Final_redhat_1.1.ep7.el6
  • eap7-jboss-remoting-0:5.0.7-1.Final_redhat_1.1.ep7.el6
  • eap7-jboss-server-migration-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-cli-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-core-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-eap6.4-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-eap6.4-to-eap7.0-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-eap6.4-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-eap7.0-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-eap7.0-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly10.0-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly10.0-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly10.1-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly10.1-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly8.2-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly8.2-to-eap7.0-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly8.2-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly9.0-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly9.0-to-eap7.0-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-jboss-server-migration-wildfly9.0-to-eap7.1-0:1.0.6-3.Final_redhat_3.1.ep7.el6
  • eap7-picketlink-api-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-picketlink-bindings-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-picketlink-common-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-picketlink-config-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-picketlink-federation-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-picketlink-idm-api-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-picketlink-idm-impl-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-picketlink-idm-simple-schema-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-picketlink-impl-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-picketlink-wildfly8-0:2.5.5-12.SP11_redhat_1.1.ep7.el6
  • eap7-undertow-0:1.4.18-6.SP7_redhat_1.1.ep7.el6
  • eap7-wildfly-0:7.1.3-2.GA_redhat_2.1.ep7.el6
  • eap7-wildfly-elytron-0:1.1.10-1.Final_redhat_1.1.ep7.el6
  • eap7-wildfly-elytron-tool-0:1.0.7-1.Final_redhat_1.1.ep7.el6
  • eap7-wildfly-javadocs-0:7.1.3-1.GA_redhat_2.1.ep7.el6
  • eap7-wildfly-modules-0:7.1.3-2.GA_redhat_2.1.ep7.el6
  • eap7-wildfly-naming-client-0:1.0.8-1.Final_redhat_1.1.ep7.el6
  • eap7-wildfly-openssl-0:1.0.6-1.Final_redhat_1.1.ep7.el6
  • eap7-wildfly-openssl-java-0:1.0.6-1.Final_redhat_1.1.ep7.el6
  • eap7-wildfly-web-console-eap-0:2.9.17-1.Final_redhat_1.1.ep7.el6

References