CVE-2017-2638
Summary
| CVE | CVE-2017-2638 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-16 13:29:00 UTC |
| Updated | 2019-10-09 23:27:00 UTC |
| Description | It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Red Hat Customer Portal |
REDHAT |
rhn.redhat.com |
Third Party Advisory |
| ISPN-7485 Restore REST authentication by tristantarrant · Pull Request #4936 · infinispan/infinispan · GitHub |
CONFIRM |
github.com |
Patch, Third Party Advisory |
| 1428564 – (CVE-2017-2638) CVE-2017-2638 infinispan: auth bypass in REST api |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| infinispan CVE-2017-2638 Authentication Bypass Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| [ISPN-7485] Restore authentication functionality on the REST connector - JBoss Issue Tracker |
CONFIRM |
issues.jboss.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 994823 Java (Maven) Security Update for org.infinispan:infinispan-server-core (GHSA-mvxp-3j62-jqr6)