A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.
                
            References
                    | Link | Resource | 
|---|---|
| https://access.redhat.com/errata/RHSA-2023:5484 | Vendor Advisory | 
| https://access.redhat.com/errata/RHSA-2023:5485 | Vendor Advisory | 
| https://access.redhat.com/errata/RHSA-2023:5486 | Vendor Advisory | 
| https://access.redhat.com/errata/RHSA-2023:5488 | Vendor Advisory | 
| https://access.redhat.com/security/cve/CVE-2023-4061 | Vendor Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=2228608 | Issue Tracking | 
| https://access.redhat.com/errata/RHSA-2023:5484 | Vendor Advisory | 
| https://access.redhat.com/errata/RHSA-2023:5485 | Vendor Advisory | 
| https://access.redhat.com/errata/RHSA-2023:5486 | Vendor Advisory | 
| https://access.redhat.com/errata/RHSA-2023:5488 | Vendor Advisory | 
| https://access.redhat.com/security/cve/CVE-2023-4061 | Vendor Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=2228608 | Issue Tracking | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 08:34
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://access.redhat.com/errata/RHSA-2023:5484 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:5485 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:5486 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:5488 - Vendor Advisory | |
| References | () https://access.redhat.com/security/cve/CVE-2023-4061 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2228608 - Issue Tracking | 
16 Nov 2023, 16:03
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.5 | 
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:* cpe:2.3:a:redhat:wildfly_core:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* | |
| First Time | Redhat Redhat enterprise Linux Redhat wildfly Core Redhat jboss Enterprise Application Platform | |
| References | () https://access.redhat.com/errata/RHSA-2023:5486 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:5484 - Vendor Advisory | |
| References | () https://access.redhat.com/security/cve/CVE-2023-4061 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:5488 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2228608 - Issue Tracking | |
| References | () https://access.redhat.com/errata/RHSA-2023:5485 - Vendor Advisory | 
08 Nov 2023, 01:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-11-08 01:15
Updated : 2024-11-21 08:34
NVD link : CVE-2023-4061
Mitre link : CVE-2023-4061
CVE.ORG link : CVE-2023-4061
JSON object : View
Products Affected
                redhat
- jboss_enterprise_application_platform
- enterprise_linux
- wildfly_core
CWE
                