CVE-2015-0279

Impact:
Important
Public Date:
2015-03-24
CWE:
CWE-95
Bugzilla:
1192140: CVE-2015-0279 RichFaces: Remote Command Execution via insufficient EL parameter sanitization
It was found that the 'do' parameter permitted expression language (EL) injection, which could allow a remote attacker to execute Java methods on an affected server.

Find out more about CVE-2015-0279 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect any version of Red Hat JBoss Enterprise Application Platform 5 as they did not include the vulnerable version of the RichFaces component. JBoss EAP 5.x includes versions 3.3.1.x of RichFaces; this vulnerability was introduced in version 4.x of RichFaces.

CVSS v2 metrics

Base Score 6.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat JBoss Web Framework Kit 2.7 RHSA-2015:0719 2015-03-24

Affected Packages State

Platform Package State
Red Hat JBoss Portal Platform 6 richfaces Affected
Red Hat JBoss Portal 5 richfaces Affected
Red Hat JBoss Operations Network 3 wildfly Affected
Red Hat JBoss Enterprise SOA Platform 5 widlfly Affected
Red Hat JBoss EAP 6 wildfly Not affected
Red Hat JBoss EAP 5 richfaces Not affected
Red Hat JBoss Data Grid 6 wildfly Not affected

Acknowledgements

Red Hat would like to thank Takeshi Terada of Mitsui Bussan Secure Directions, Inc. for reporting this issue.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.