You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /adapters/oidc/wildfly/wildfly-subsystem/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar
A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability.
CVE-2020-35510 - Medium Severity Vulnerability
Vulnerable Library - jboss-remoting-5.0.19.Final.jar
JBoss Remoting
Library home page: http://www.jboss.org
Path to dependency file: /adapters/oidc/wildfly/wildfly-subsystem/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar,/home/wss-scanner/.m2/repository/org/jboss/remoting/jboss-remoting/5.0.19.Final/jboss-remoting-5.0.19.Final.jar
Dependency Hierarchy:
Found in HEAD commit: 34eee947640ca637662cb41e649c6acf8b6d8c2e
Found in base branch: master
Vulnerability Details
A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Publish Date: 2021-06-02
URL: CVE-2020-35510
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-p6j8-hgv5-m35g
Release Date: 2021-06-02
Fix Resolution: org.jboss.remoting:jboss-remoting:5.0.20.Final
The text was updated successfully, but these errors were encountered: