JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.
CPE | Name | Operator | Version |
---|---|---|---|
jboss_enterprise_application_platform | eq | 4.3.0 |
archives.neohapsis.com/archives/bugtraq/2013-05/0117.html
www.redhat.com/support/errata/RHSA-2010-0564.html
www.securityfocus.com/bid/41994
www.securitytracker.com/id?1024253
www.vupen.com/english/advisories/2010/1929
bugzilla.redhat.com/show_bug.cgi?id=615956
exchange.xforce.ibmcloud.com/vulnerabilities/60794
security.netapp.com/advisory/ntap-20161017-0001/