Jboss Middleware Red Hat Jboss Middleware

Do you want an email whenever new security vulnerabilities are reported in Red Hat Jboss Middleware?

By the Year

In 2024 there have been 0 vulnerabilities in Red Hat Jboss Middleware . Last year Jboss Middleware had 3 security vulnerabilities published. Right now, Jboss Middleware is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 3 6.37
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 1 5.90

It may take a day or so for new Jboss Middleware vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Jboss Middleware Security Vulnerabilities

A flaw was found in Red Hat's AMQ Broker

CVE-2023-4066 5.5 - Medium - September 27, 2023

A flaw was found in Red Hat's AMQ Broker, which stores certain passwords in a secret security-properties-prop-module, defined in ActivemqArtemisSecurity CR; however, they are shown in plaintext in the StatefulSet details yaml of AMQ Broker.

Cleartext Storage of Sensitive Information

A flaw was found in Red Hat AMQ Broker Operator

CVE-2023-4065 5.5 - Medium - September 27, 2023

A flaw was found in Red Hat AMQ Broker Operator, where it displayed a password defined in ActiveMQArtemisAddress CR, shown in plain text in the Operator Log. This flaw allows an authenticated local attacker to access information outside of their permissions.

Incorrect Default Permissions

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests

CVE-2023-4853 8.1 - High - September 20, 2023

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.

AuthZ

The URL pattern of "" (the empty string)

CVE-2018-1304 5.9 - Medium - February 28, 2018

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Debian Linux or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe