CVE-2018-10682
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2018-10682 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
Red Hat Product Security does not consider this issue as a vulnerability. The default installation are by default secured which means that management interfaces are set to have an authentication mechanism. Even without security on the management interfaces there are other approaches that could be taken, as an example a proxy fronting the server could be taking over the configuration. A second one could be the application server is running on an isolated device that does not allow network connections to it so only a local trusted process can communicate with it. Our default out of the box security considers that the server could be installed on a multi-user server so other users could inadvertently gain access if we had no security. However in many cases the server will be installed on a single user workstation for developer use, in that case being able to switch off security is desirable so the admin console can be accessed without the need for user accounts. As we switch to the Elytron configuration it is also possible for an administrator to define anonymous authentication policies even if sasl-authentication-factory is not referenced. HTTP remains the same, it is either on or off, a user could however still implement a custom anonymous mechanism.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 8.1 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Attack Vector | Network |
| Attack Complexity | High |
| Privileges Required | None |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity Impact | High |
| Availability Impact | High |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Virtualization 4 | eap7-wildfly | Not affected |
| Red Hat Single Sign-On 7 | wildfly | Not affected |
| Red Hat JBoss EAP 7 | wildfly | Not affected |
| Red Hat JBoss Data Grid 7 | wildfly | Not affected |
Acknowledgements
Red Hat would like to thank Jean-marie Bourbon (Excellium-Services) and Anthony Maia (Excellium-Services) for reporting this issue.CVE description copyright © 2017, The MITRE Corporation
