Access Restriction Bypass Affecting org.wildfly.core:wildfly-controller package, versions [,16.0.1)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGWILDFLYCORE-1318892
  • published15 Jul 2021
  • disclosed14 Jul 2021
  • creditUnknown

Introduced: 14 Jul 2021

CVE-2021-3644  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade org.wildfly.core:wildfly-controller to version 16.0.1 or higher.

Overview

org.wildfly.core:wildfly-controller is a The core runtime that is used by the WildFly application server.

Affected versions of this package are vulnerable to Access Restriction Bypass. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault.

CVSS Scores

version 3.1