RHEL 5 : JBoss EAP (RHSA-2008:0828)

Medium Nessus Plugin ID 63863


The remote Red Hat host is missing one or more security updates.


Updated JBoss Enterprise Application Platform (JBoss EAP) packages that fix various security issues are now available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

JBoss EAP is a middleware platform for Java 2 Platform, Enterprise Edition (J2EE) applications.

This release of JBoss EAP for Red Hat Enterprise Linux 5 contains the JBoss Application Server and JBoss Seam. This release serves as a replacement to JBoss EAP 4.3.0.GA, and fixes the following security issues :

The JavaServer Faces (JSF) component was vulnerable to multiple cross-site scripting (XSS) vulnerabilities. An attacker could use these flaws to inject arbitrary web script or HTML. (CVE-2008-1285)

Unauthenticated users were able to access the status servlet, which could allow remote attackers to acquire details about deployed web contexts. (CVE-2008-3273)

These updated packages include bug fixes and enhancements which are not listed here. For a full list, refer to the JBoss EAP 4.3.0.CP01 release notes, linked to in the 'References' section of this advisory.

Warning: before applying this update, please back up the JBoss EAP 'server/[configuration]/deploy/' directory, and any customized configuration files.

All users of JBoss EAP on Red Hat Enterprise Linux 5 are advised to upgrade to these updated packages, which resolve these issues.


Update the affected packages.

See Also





Plugin Details

Severity: Medium

ID: 63863

File Name: redhat-RHSA-2008-0828.nasl

Version: $Revision: 1.11 $

Type: local

Agent: unix

Published: 2013/01/24

Modified: 2017/01/03

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:asm, p-cpe:/a:redhat:enterprise_linux:cglib, p-cpe:/a:redhat:enterprise_linux:concurrent, p-cpe:/a:redhat:enterprise_linux:glassfish-jaf, p-cpe:/a:redhat:enterprise_linux:glassfish-javamail, p-cpe:/a:redhat:enterprise_linux:glassfish-jsf, p-cpe:/a:redhat:enterprise_linux:hibernate3-annotations, p-cpe:/a:redhat:enterprise_linux:hibernate3-annotations-javadoc, p-cpe:/a:redhat:enterprise_linux:hibernate3-entitymanager, p-cpe:/a:redhat:enterprise_linux:hibernate3-entitymanager-javadoc, p-cpe:/a:redhat:enterprise_linux:hibernate3-javadoc, p-cpe:/a:redhat:enterprise_linux:jboss-aop, p-cpe:/a:redhat:enterprise_linux:jboss-cache, p-cpe:/a:redhat:enterprise_linux:jboss-messaging, p-cpe:/a:redhat:enterprise_linux:jboss-remoting, p-cpe:/a:redhat:enterprise_linux:jboss-seam, p-cpe:/a:redhat:enterprise_linux:jboss-seam-docs, p-cpe:/a:redhat:enterprise_linux:jbossas, p-cpe:/a:redhat:enterprise_linux:jbossts, p-cpe:/a:redhat:enterprise_linux:jbossws, p-cpe:/a:redhat:enterprise_linux:jbossws-native42, p-cpe:/a:redhat:enterprise_linux:jbossxb, p-cpe:/a:redhat:enterprise_linux:jcommon, p-cpe:/a:redhat:enterprise_linux:jfreechart, p-cpe:/a:redhat:enterprise_linux:jgroups, p-cpe:/a:redhat:enterprise_linux:rh-eap-docs, cpe:/o:redhat:enterprise_linux:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/08/05

Reference Information

CVE: CVE-2008-1285, CVE-2008-3273

BID: 30540

OSVDB: 42713, 47551

RHSA: 2008:0828

CWE: 79, 264