Bug 1593527 (CVE-2018-10862)
Summary: | CVE-2018-10862 wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aboyko, alazarot, anstephe, asoldano, atangrin, avibelli, bbaranow, bgeorges, bmaxwell, bmcclain, brian.stansberry, cdewolf, chazlett, csutherl, darran.lofthouse, dblechte, dimitris, dkreling, dosoudil, drieden, eedri, etirelli, fgavrilo, ibek, iweiss, java-sig-commits, jawilson, jbalunas, jochrist, jolee, jondruse, jpallich, jperkins, jschatte, jshepherd, jstastny, jwon, krathod, kverlaen, kwills, lef, lgao, loleary, lpetrovi, lthon, mgoldboi, michal.skrivanek, msochure, msvehla, mszynkie, myarboro, nwallace, paradhya, pdrozd, pgallagh, pgier, pjindal, pjurak, pmackay, ppalaga, psakar, pslavice, psotirop, puntogil, rguimara, rnetuka, rrajasek, rruss, rstancel, rsvoboda, rsynek, rzhang, sbonazzo, sdaley, security-response-team, sgoodman, sherold, smaestri, spinder, sstavrev, sthorger, theute, tom.jenkinson, trogers, twalsh, vhalbert, vtunka, ykaul |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | wildfly-core 6.0.0.Alpha3 | Doc Type: | If docs needed, set a value |
Doc Text: |
It was found that the explode function of the deployment utility in jboss-cli and console that allows extraction of files from an archive does not perform necessary validation for directory traversal. This can lead to remote code execution.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:29:41 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1594634, 1594635, 1594636, 1700959, 1700960 | ||
Bug Blocks: | 1593112 |
Description
Sam Fowler
2018-06-21 02:09:46 UTC
Statement: This vulnerability can only be exploited by users with deployment permissions. Created wildfly-common tracking bugs for this issue: Affects: epel-7 [bug 1594635] Created wildfly-core tracking bugs for this issue: Affects: fedora-all [bug 1594634] This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2018:2277 https://access.redhat.com/errata/RHSA-2018:2277 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Via RHSA-2018:2276 https://access.redhat.com/errata/RHSA-2018:2276 This issue has been addressed in the following products: Red Hat Single Sign-On Via RHSA-2018:2279 https://access.redhat.com/errata/RHSA-2018:2279 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2018:2425 https://access.redhat.com/errata/RHSA-2018:2425 This issue has been addressed in the following products: Red Hat Single Sign-On 7.2.4 zip Via RHSA-2018:2428 https://access.redhat.com/errata/RHSA-2018:2428 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Via RHSA-2018:2423 https://access.redhat.com/errata/RHSA-2018:2423 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Via RHSA-2018:2424 https://access.redhat.com/errata/RHSA-2018:2424 If this bug requires doc text for errata release, please set the 'Doc Type' and provide draft text according to the template in the 'Doc Text' field. The documentation team will review, edit, and approve the text. If this bug does not require doc text, please set the 'requires_doc_text' flag to -. This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2018:2643 https://access.redhat.com/errata/RHSA-2018:2643 This issue has been addressed in the following products: Red Hat Openshift Application Runtimes Via RHSA-2019:0877 https://access.redhat.com/errata/RHSA-2019:0877 This issue has been addressed in the following products: Red Hat Data Grid 7.3.6 Via RHSA-2020:2321 https://access.redhat.com/errata/RHSA-2020:2321 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2020:2562 https://access.redhat.com/errata/RHSA-2020:2562 |