← Back to CVEs
CVE-2021-3644
LOW3.3
Description
A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest threat from this vulnerability is data confidentiality and integrity.
CVE Details
CVSS v3.1 Score3.3
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredHIGH
User InteractionNONE
Published8/26/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
redhat:descision_managerredhat:wildfly
Weaknesses (CWE)
CWE-200
References
https://access.redhat.com/security/cve/CVE-2021-3644(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1976052(secalert@redhat.com)
https://github.com/wildfly/wildfly-core/commit/06dd9884f6ba50470b1fb5a35198a8784f037714(secalert@redhat.com)
https://github.com/wildfly/wildfly-core/commit/6d8db43cd43b5994b7a14003db978064e086090b(secalert@redhat.com)
https://github.com/wildfly/wildfly-core/pull/4668(secalert@redhat.com)
https://issues.redhat.com/browse/WFCORE-5511(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2021-3644(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1976052(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/wildfly/wildfly-core/commit/06dd9884f6ba50470b1fb5a35198a8784f037714(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/wildfly/wildfly-core/commit/6d8db43cd43b5994b7a14003db978064e086090b(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/wildfly/wildfly-core/pull/4668(af854a3a-2127-422b-91ae-364da2661108)
https://issues.redhat.com/browse/WFCORE-5511(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.