Bug 1400343 (CVE-2016-8657) - CVE-2016-8657 jboss: jbossas writable config files allow privilege escalation
Summary: CVE-2016-8657 jboss: jbossas writable config files allow privilege escalation
Status: ON_QA
Alias: CVE-2016-8657
Product: Security Response
Classification: Other
Component: vulnerability   
(Show other bugs)
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20161010,repo...
Keywords: Security
Depends On: 1402969 1402970 1402971
Blocks: 1399004 1428993
TreeView+ depends on / blocked
 
Reported: 2016-11-30 23:16 UTC by Bharti Kundal
Modified: 2018-10-19 21:38 UTC (History)
26 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0826 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 5 2017-03-22 20:46:23 UTC
Red Hat Product Errata RHSA-2017:0827 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 6 2017-03-22 20:43:37 UTC
Red Hat Product Errata RHSA-2017:0828 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 7 2017-03-22 20:40:43 UTC
Red Hat Product Errata RHSA-2017:0829 normal SHIPPED_LIVE Important: jboss-ec2-eap security, bug fix, and enhancement update 2017-03-22 21:11:17 UTC
Red Hat Product Errata RHSA-2018:1609 None None None 2018-05-17 18:27 UTC

Description Bharti Kundal 2016-11-30 23:16:13 UTC
It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files.  The file is writable to jboss group (root:jboss, 664).  On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jbossas init script and its content executed with root privileges when jbossas service is started, stopped or restarted.

Comment 12 errata-xmlrpc 2017-03-14 17:33:11 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4.14 

Via RHSA-2017:0517 https://rhn.redhat.com/errata/RHSA-2017-0517.html

Comment 13 errata-xmlrpc 2017-03-22 16:49:58 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7

Via RHSA-2017:0828 https://rhn.redhat.com/errata/RHSA-2017-0828.html

Comment 14 errata-xmlrpc 2017-03-22 16:51:14 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6

Via RHSA-2017:0827 https://rhn.redhat.com/errata/RHSA-2017-0827.html

Comment 15 errata-xmlrpc 2017-03-22 16:52:26 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5

Via RHSA-2017:0826 https://rhn.redhat.com/errata/RHSA-2017-0826.html

Comment 16 errata-xmlrpc 2017-03-22 17:12:20 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6

Via RHSA-2017:0829 https://rhn.redhat.com/errata/RHSA-2017-0829.html

Comment 19 Bharti Kundal 2017-07-31 07:16:47 UTC
Statement:

It was found that a variant of the Tomcat CVE-2016-6325 exploit is also applicable to Red Hat JBoss Enterprise Application Platform 5 and 6. CVE-2016-8567 addresses these problems with JBoss EAP. The complexity is high as EAP has many files and configuration options. The issue is now corrected in JBoss Enterprise Application Platform EAP 6.4.14. For further information please refer https://access.redhat.com/articles/3016681

Comment 20 errata-xmlrpc 2018-05-17 18:26:50 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 5 for RHEL 5
  Red Hat JBoss Enterprise Application Platform 5 for RHEL 6

Via RHSA-2018:1609 https://access.redhat.com/errata/RHSA-2018:1609


Note You need to log in before you can comment on or make changes to this bug.