CVE-2012-1154: Improper Access Control in JBoss mod_cluster
(updated )
mod_cluster 1.0.10 before 1.0.10 CP03 and 1.1.x before 1.1.4, as used in JBoss Enterprise Application Platform 5.1.2, when “ROOT” is set to excludedContexts, exposes the root context of the server, which allows remote attackers to bypass access restrictions and gain access to applications deployed on the root context via unspecified vectors.
References
- rhn.redhat.com/errata/RHSA-2012-1010.html
- rhn.redhat.com/errata/RHSA-2012-1011.html
- rhn.redhat.com/errata/RHSA-2012-1012.html
- rhn.redhat.com/errata/RHSA-2012-1052.html
- rhn.redhat.com/errata/RHSA-2012-1053.html
- rhn.redhat.com/errata/RHSA-2012-1166.html
- secunia.com/advisories/49636
- bugzilla.redhat.com/show_bug.cgi?id=802200
- community.jboss.org/message/624018
- github.com/advisories/GHSA-v2fp-h4qx-x3r6
- issues.jboss.org/browse/MODCLUSTER-253
- nvd.nist.gov/vuln/detail/CVE-2012-1154
Detect and mitigate CVE-2012-1154 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →