Vulnerabilities > Redhat > Jboss Enterprise Application Platform > 6.0.0

DATE CVE VULNERABILITY TITLE RISK
2014-11-17 CVE-2014-0059 Information Exposure vulnerability in Redhat Jboss Enterprise Application Platform
JBoss SX and PicketBox, as used in Red Hat JBoss Enterprise Application Platform (EAP) before 6.2.3, use world-readable permissions on audit.log, which allows local users to obtain sensitive information by reading this file.
local
low complexity
redhat CWE-200
2.1
2014-07-07 CVE-2014-3481 Information Exposure vulnerability in Redhat Jboss Enterprise Application Platform
org.jboss.as.jaxrs.deployment.JaxrsIntegrationProcessor in Red Hat JBoss Enterprise Application Platform (JEAP) before 6.2.4 enables entity expansion, which allows remote attackers to read arbitrary files via unspecified vectors, related to an XML External Entity (XXE) issue.
network
low complexity
redhat CWE-200
5.0
2014-02-26 CVE-2014-0058 Cryptographic Issues vulnerability in Redhat Jboss Enterprise Application Platform
The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.
local
redhat CWE-310
1.9
2013-12-06 CVE-2013-2133 Permissions, Privileges, and Access Controls vulnerability in Redhat products
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) before 6.2.0, does not properly enforce the method level restrictions for JAX-WS Service endpoints, which allows remote authenticated users to access otherwise restricted JAX-WS handlers by leveraging permissions to the EJB class.
network
low complexity
redhat CWE-264
5.5
2013-10-28 CVE-2012-4572 Permissions, Privileges, and Access Controls vulnerability in Redhat products
Red Hat JBoss Enterprise Application Platform (EAP) before 6.1.0 and JBoss Portal before 6.1.0 does not load the implementation of a custom authorization module for a new application when an implementation is already loaded and the modules share class names, which allows local users to control certain applications' authorization decisions via a crafted application.
local
high complexity
redhat CWE-264
3.7
2013-10-28 CVE-2012-4529 Session ID Information Disclosure vulnerability in Redhat products
The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.
network
redhat
4.3
2013-09-28 CVE-2013-1921 Cryptographic Issues vulnerability in Redhat Jboss Enterprise Application Platform
PicketBox, as used in Red Hat JBoss Enterprise Application Platform before 6.1.1, allows local users to obtain the admin encryption key by reading the Vault data file.
local
redhat CWE-310
1.9
2013-01-05 CVE-2012-4550 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Enterprise Application Platform 6.0.0
JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, when using role-based authorization for Enterprise Java Beans (EJB) access, does not call the intended authorization modules, which prevents JACC permissions from being applied and allows remote attackers to obtain access to the EJB.
network
low complexity
redhat CWE-264
6.4
2013-01-05 CVE-2012-4549 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Enterprise Application Platform
The processInvocation function in org.jboss.as.ejb3.security.AuthorizationInterceptor in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, authorizes all requests when no roles are allowed for an Enterprise Java Beans (EJB) method invocation, which allows attackers to bypass intended access restrictions for EJB methods.
network
redhat CWE-264
5.8