CVE-2016-8627
admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired.
admin-cli, en versiones anteriores a la 3.0.0.alpha25 y 2.2.1.cr2, es vulnerable a que una característica EAP descargue archivos de registro del servidor, lo que permite que estos estén disponibles mediante peticiones GET. Esto hace que sean vulnerables a ataques de Cross-Origin. Un atacante podría provocar que el navegador del usuario solicite los archivos de registro, consumiendo tantos recursos que el funcionamiento normal del servidor se vería afectado.
An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-10-12 CVE Reserved
- 2017-01-19 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/95698 | Third Party Advisory | |
http://www.securitytracker.com/id/1037660 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8627 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0170.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0171.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0172.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0173.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0244.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0245.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0246.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0247.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0250.html | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2017:3454 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2017:3455 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2017:3456 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2017:3458 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2016-8627 | 2017-12-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1388240 | 2017-12-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 6.4.0 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "6.4.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 7.0.0 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "7.0.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 7.1.0 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "7.1.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Keycloak Search vendor "Redhat" for product "Keycloak" | - | - |
Affected
|