CVE-2016-8627

admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2017-0170.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0171.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0172.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0173.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0244.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0245.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0246.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0247.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0250.html Third Party Advisory
http://www.securityfocus.com/bid/95698 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037660 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:3454 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3455 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3456 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3458 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8627 Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0170.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0171.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0172.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0173.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0244.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0245.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0246.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0247.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0250.html Third Party Advisory
http://www.securityfocus.com/bid/95698 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037660 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:3454 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3455 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3456 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3458 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8627 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-05-11 13:29

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8627

Mitre link : CVE-2016-8627

CVE.ORG link : CVE-2016-8627


JSON object : View

Products Affected

redhat

  • jboss_enterprise_application_platform
  • keycloak
CWE
CWE-400

Uncontrolled Resource Consumption