CVE-2016-5406
EAP7 Privilege escalation when managing domain including earlier version slaves
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The domain controller in Red Hat JBoss Enterprise Application Platform (EAP) 7.x before 7.0.2 allows remote authenticated users to gain privileges by leveraging failure to propagate administrative RBAC configuration to all slaves.
El controlador de dominios en Red Hat JBoss Enterprise Application Platform (EAP) 7.x en versiones anteriores a 7.0.2 permite a usuarios remotos autenticados obtener privilegios aprovechando el fallo de propagaciĆ³n de configuraciĆ³n RBAC administrativa a todos los esclavos.
The domain controller will not propagate its administrative RBAC configuration to some slaves. An attacker could use this to escalate their privileges.
Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.0 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: A Denial of Service can be caused when a long request is sent to EAP 7.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-06-10 CVE Reserved
- 2016-09-08 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (10)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-1838.html | 2017-12-15 | |
http://rhn.redhat.com/errata/RHSA-2016-1839.html | 2017-12-15 | |
http://rhn.redhat.com/errata/RHSA-2016-1840.html | 2017-12-15 | |
http://rhn.redhat.com/errata/RHSA-2016-1841.html | 2017-12-15 | |
https://access.redhat.com/errata/RHSA-2017:3454 | 2017-12-15 | |
https://access.redhat.com/errata/RHSA-2017:3455 | 2017-12-15 | |
https://access.redhat.com/errata/RHSA-2017:3456 | 2017-12-15 | |
https://access.redhat.com/errata/RHSA-2017:3458 | 2017-12-15 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1359014 | 2017-12-13 | |
https://access.redhat.com/security/cve/CVE-2016-5406 | 2017-12-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | <= 7.0.1 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version " <= 7.0.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 6.0 Search vendor "Redhat" for product "Enterprise Linux" and version "6.0" | - |
Safe
|
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | <= 7.0.1 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version " <= 7.0.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.0 Search vendor "Redhat" for product "Enterprise Linux" and version "7.0" | - |
Safe
|