Bug 1615673 (CVE-2018-10934)

Summary: CVE-2018-10934 wildfly-core: Cross-site scripting (XSS) in JBoss Management Console
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: alazarot, anstephe, asoldano, bbaranow, bmaxwell, brian.stansberry, cdewolf, chazlett, csutherl, darran.lofthouse, dimitris, dosoudil, drieden, etirelli, fgavrilo, ibek, iweiss, java-sig-commits, jawilson, jkurik, jolee, jondruse, jperkins, jschatte, jshepherd, jstastny, krathod, kverlaen, kwills, lef, lgao, loleary, lpetrovi, msochure, msvehla, myarboro, nwallace, paradhya, pdrozd, pgier, pjurak, pmackay, ppalaga, psakar, pslavice, psotirop, puntogil, rguimara, rnetuka, rrajasek, rstancel, rsvoboda, rsynek, rzhang, sdaley, smaestri, spinder, sstavrev, sthorger, theute, tom.jenkinson, twalsh, vhalbert, vtunka
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: wildfly-core 7.1.6.CR1, wildfly-core 7.1.6.GA Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:35:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1616974, 1616976    
Bug Blocks: 1614541    

Description Sam Fowler 2018-08-14 02:20:30 UTC
A cross-site scripting (XSS) vulnerability was found in the JBoss Management Console. Users with roles that can create objects in the application can exploit this to attack other privileged users.

Comment 5 Bharti Kundal 2018-08-26 11:18:41 UTC
Acknowledgments:

Name: Jakub Palaczynski

Comment 7 errata-xmlrpc 2019-02-18 15:42:51 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2019:0362 https://access.redhat.com/errata/RHSA-2019:0362

Comment 8 errata-xmlrpc 2019-02-18 15:46:46 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2019:0364 https://access.redhat.com/errata/RHSA-2019:0364

Comment 9 errata-xmlrpc 2019-02-18 15:49:05 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7

Via RHSA-2019:0365 https://access.redhat.com/errata/RHSA-2019:0365

Comment 10 errata-xmlrpc 2019-02-19 17:18:58 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.2.6 zip

Via RHSA-2019:0380 https://access.redhat.com/errata/RHSA-2019:0380

Comment 11 errata-xmlrpc 2019-05-13 17:01:18 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5

Via RHSA-2019:1159 https://access.redhat.com/errata/RHSA-2019:1159

Comment 12 errata-xmlrpc 2019-05-13 17:04:10 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7

Via RHSA-2019:1161 https://access.redhat.com/errata/RHSA-2019:1161

Comment 13 errata-xmlrpc 2019-05-13 17:06:55 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6

Via RHSA-2019:1160 https://access.redhat.com/errata/RHSA-2019:1160

Comment 14 errata-xmlrpc 2019-05-13 17:24:53 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2019:1162 https://access.redhat.com/errata/RHSA-2019:1162

Comment 15 Joshua Padman 2019-05-15 22:49:16 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Operations Network 3
 * Red Hat JBoss Fuse 6
 * Red Hat JBoss Data Virtualization & Services 6
 * Red Hat JBoss BRMS 6
 * Red Hat JBoss BPM Suite 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.