You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /testsuite/integration-arquillian/tests/base/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar
A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest threat from this vulnerability is data confidentiality and integrity.
CVE-2021-3644 - Low Severity Vulnerability
Vulnerable Library - wildfly-controller-13.0.3.Final.jar
Path to dependency file: /testsuite/integration-arquillian/tests/base/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/home/wss-scanner/.m2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar,/2/repository/org/wildfly/core/wildfly-controller/13.0.3.Final/wildfly-controller-13.0.3.Final.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest threat from this vulnerability is data confidentiality and integrity.
Publish Date: 2022-08-26
URL: CVE-2021-3644
CVSS 3 Score Details (3.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2022-08-26
Fix Resolution: org.wildfly.core:wildfly-controller:16.0.1.Final
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: