A flaw was found in Jolokia versions from 1.2. up to and including 1.6.0. Affected versions are vulnerable to a system-wide CSRF. This holds true for properly configured instances with strict checking for origin and referrer headers. This could result in a Remote Code Execution attack.
Acknowledgments: Name: Martin Bajanik
External References: https://jolokia.org/#Minor_updates_coming_with_1.6.1
This issue has been addressed in the following products: Red Hat Fuse 7.4.0 Via RHSA-2019:2413 https://access.redhat.com/errata/RHSA-2019:2413
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-10899
This vulnerability is out of security support scope for the following products: * JBoss Developer Studio 11 Please refer to https://access.redhat.com/node/4027141 for more details.
This issue has been addressed in the following products: Red Hat Fuse 6.3 Via RHSA-2019:2804 https://access.redhat.com/errata/RHSA-2019:2804
Statement: In Red Hat OpenStack Platform, jolokia is not enabled by default and, when enabled, the jolokia endpoints do not rely on CORS for security. Therefore, the impact has been reduced to Low and no updates will be provided at this time for the RHOSP jolokia package.