Rapid7 Vulnerability & Exploit Database

Red Hat JBoss: CVE-2011-2196: A remote attacker could execute arbitrary code via a URL

Back to Search

Red Hat JBoss: CVE-2011-2196: A remote attacker could execute arbitrary code via a URL

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
07/26/2011
Created
07/25/2018
Added
08/01/2017
Modified
08/01/2017

Description

jboss-seam.jar in the JBoss Seam 2 framework 2.2.x and earlier, as distributed in Red Hat JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0; JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3.0, 4.3.0.CP09, and 5.1.1; and JBoss Enterprise Web Platform 5.1.1, does not properly restrict use of Expression Language (EL) statements in FacesMessages during page exception handling, which allows remote attackers to execute arbitrary Java code via a crafted URL to an application. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1484.

Solution(s)

  • jboss_enterprise_application_platform-cve-2011-2196-1
  • jboss_enterprise_application_platform-cve-2011-2196-2
  • jboss_enterprise_application_platform-cve-2011-2196-3

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;