Description
It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.
Published: 2016-06-30
Score: 9.8 Critical
EPSS: 2.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-5146 It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.
Github GHSA Github GHSA GHSA-rc7h-x6cq-988q Improper Input Validation in JGroups
History

No history.

Subscriptions

Redhat Enterprise Linux Jboss Data Grid Jboss Data Virtualization Jboss Enterprise Application Platform Jboss Enterprise Brms Platform Jboss Enterprise Portal Platform Jboss Enterprise Soa Platform Jboss Fuse Jboss Fuse Service Works Jboss Single Sign On Jgroups
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T23:17:50.610Z

Reserved: 2016-01-29T00:00:00.000Z

Link: CVE-2016-2141

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-06-30T16:59:00.117

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-2141

cve-icon Redhat

Severity : Critical

Publid Date: 2016-06-23T00:00:00Z

Links: CVE-2016-2141 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses