It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2638 | issue tracking third party advisory patch |
http://rhn.redhat.com/errata/RHSA-2017-1097.html | third party advisory vendor advisory |
https://issues.jboss.org/browse/ISPN-7485 | third party advisory |
https://github.com/infinispan/infinispan/pull/4936/commits | third party advisory patch |
http://www.securityfocus.com/bid/97964 | vdb entry third party advisory |