It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Jboss Data Grid Subscribe
Jboss Data Virtualization Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Brms Platform Subscribe
Jboss Enterprise Portal Platform Subscribe
Jboss Enterprise Soa Platform Subscribe
Jboss Fuse Subscribe
Jboss Fuse Service Works Subscribe
Jboss Single Sign On Subscribe
Jgroups Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-5146 It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.
Github GHSA Github GHSA GHSA-rc7h-x6cq-988q Improper Input Validation in JGroups
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T23:17:50.610Z

Reserved: 2016-01-29T00:00:00

Link: CVE-2016-2141

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-06-30T16:59:00.117

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-2141

cve-icon Redhat

Severity : Critical

Publid Date: 2016-06-23T00:00:00Z

Links: CVE-2016-2141 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses