Rapid7 Vulnerability & Exploit Database

RHSA-2011:0461: jboss-seam2 security update

Back to Search

RHSA-2011:0461: jboss-seam2 security update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
07/26/2011
Created
07/25/2018
Added
07/26/2011
Modified
07/04/2017

Description

Updated jboss-seam2 packages that fix one security issue are now available for JBoss Enterprise Application Platform 5.1 for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

The JBoss Seam 2 framework is an application framework for building web applications in Java. It was found that JBoss Seam 2 did not properly block access to JBoss Expression Language (EL) constructs in page exception handling, allowing arbitrary Java methods to be executed. A remote attacker could use this flaw to execute arbitrary code via a specially-crafted URL provided to certain applications based on the JBoss Seam 2 framework. Note: A properly configured and enabled Java Security Manager would prevent exploitation of this flaw. (CVE-2011-1484) Red Hat would like to thank Martin Kouba from IT SYSTEMS a.s. for reporting this issue. Users of jboss-seam2 should upgrade to these updated packages, which correct this issue. The JBoss server process must be restarted for this update to take effect.

Solution(s)

  • redhat-upgrade-jboss-seam2
  • redhat-upgrade-jboss-seam2-docs
  • redhat-upgrade-jboss-seam2-examples
  • redhat-upgrade-jboss-seam2-runtime

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;