27.0.0.Final
10 years ago
17 days ago
Known vulnerabilities in the org.wildfly.core:wildfly-controller package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.wildfly.core:wildfly-controller is a The core runtime that is used by the WildFly application server. Affected versions of this package are vulnerable to Information Exposure via the Note: This is only exploitable if the attacker has management user access. Mitigation: Administrators are recommended to use Vault, especially the Elytron subsystem, to store potential critical information such as DNS, IPs, and credentials. How to fix Information Exposure? Upgrade | [0,22.0.0.Final) |
org.wildfly.core:wildfly-controller is a The core runtime that is used by the WildFly application server. Affected versions of this package are vulnerable to Access Restriction Bypass. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. How to fix Access Restriction Bypass? Upgrade | [,16.0.1) |