Vulnerability Name:

CVE-2016-2141 (CCN-114439)

Assigned:2016-06-24
Published:2016-06-24
Updated:2023-04-26
Summary:
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2016-2141

Source: CCN
Type: RHSA-2016-1328
Critical: Red Hat JBoss Enterprise Application Platform 5.2 security update

Source: CCN
Type: RHSA-2016-1329
Critical: Red Hat JBoss Enterprise Application Platform 5.2 security update

Source: CCN
Type: RHSA-2016-1330
Critical: Red Hat JBoss Enterprise Application Platform 6.4 security update

Source: CCN
Type: RHSA-2016-1331
Critical: Red Hat JBoss Enterprise Application Platform 6.4 security update

Source: CCN
Type: RHSA-2016-1332
Critical: Red Hat JBoss Enterprise Application Platform 7.0 security update

Source: CCN
Type: RHSA-2016-1333
Critical: Red Hat JBoss Enterprise Application Platform 7.0 security update

Source: CCN
Type: RHSA-2016-1334
Critical: Red Hat JBoss Data Grid 6.6 security update

Source: CCN
Type: RHSA-2016-1345
Critical: Red Hat JBoss BRMS security update

Source: CCN
Type: RHSA-2016-1346
Critical: Red Hat JBoss Data Virtualization security and bug fix update

Source: CCN
Type: RHSA-2016-1347
Critical: Red Hat JBoss BPM Suite security update

Source: CCN
Type: RHSA-2016-1374
Critical: Red Hat JBoss Portal 6.2.0 security update

Source: CCN
Type: RHSA-2016-1376
Critical: Red Hat JBoss SOA Platform security update

Source: CCN
Type: RHSA-2016-1389
Critical: Red Hat JBoss Fuse Service Works security update

Source: CCN
Type: RHSA-2016-1432
Critical: jboss-ec2-eap security, bug fix, and enhancement update

Source: CCN
Type: RHSA-2016-1433
Critical: Red Hat JBoss Enterprise Application Platform 6.4.9 update

Source: CCN
Type: RHSA-2016-1434
Critical: Red Hat JBoss Enterprise Application Platform update

Source: CCN
Type: RHSA-2016-1435
Critical: Red Hat JBoss Enterprise Application Platform 6.4.9 update

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: CCN
Type: RHSA-2016-1439
Critical: Red Hat Single Sign-On security update

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: CCN
Type: RHSA-2016-2035
Important: Red Hat JBoss Fuse 6.3 security update

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: CCN
Type: SECTRACK ID: 1036165
JBoss Authentication Flaw in JGroups Lets Remote Users Bypass Security Restrictions on the Target System

Source: CCN
Type: Oracle CPUApr2019
Oracle Critical Patch Update Advisory - April 2019

Source: CCN
Type: BID-91481
JGroups CVE-2016-2141 Authorization Bypass Vulnerability

Source: secalert@redhat.com
Type: VDB Entry
secalert@redhat.com

Source: secalert@redhat.com
Type: Broken Link, Third Party Advisory, VDB Entry
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: CCN
Type: Red Hat Bugzilla – Bug 1313589
(CVE-2016-2141) CVE-2016-2141 Authorization bypass in JGroups

Source: XF
Type: UNKNOWN
redhat-jboss-cve20162141-sec-bypass(114439)

Source: secalert@redhat.com
Type: Issue Tracking, Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Broken Link, Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Broken Link, Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Broken Link, Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Patch, Third Party Advisory
secalert@redhat.com

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2016-2141

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:6:*:el6:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_data_virtualization:*:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_data_grid:*:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_bpm_suite:*:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_brms:5.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:6.4.8:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:knowledge:8.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:knowledge:8.6.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.bionic:def:201621410000000
    V
    CVE-2016-2141 on Ubuntu 18.04 LTS (bionic) - medium.
    2016-06-30
    oval:com.ubuntu.artful:def:20162141000
    V
    CVE-2016-2141 on Ubuntu 17.10 (artful) - medium.
    2016-06-30
    oval:com.ubuntu.trusty:def:20162141000
    V
    CVE-2016-2141 on Ubuntu 14.04 LTS (trusty) - medium.
    2016-06-30
    oval:com.ubuntu.xenial:def:201621410000000
    V
    CVE-2016-2141 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-06-30
    oval:com.ubuntu.bionic:def:20162141000
    V
    CVE-2016-2141 on Ubuntu 18.04 LTS (bionic) - medium.
    2016-06-30
    oval:com.ubuntu.xenial:def:20162141000
    V
    CVE-2016-2141 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-06-30
    oval:com.ubuntu.disco:def:201621410000000
    V
    CVE-2016-2141 on Ubuntu 19.04 (disco) - medium.
    2016-06-30
    oval:com.ubuntu.cosmic:def:20162141000
    V
    CVE-2016-2141 on Ubuntu 18.10 (cosmic) - medium.
    2016-06-30
    oval:com.ubuntu.cosmic:def:201621410000000
    V
    CVE-2016-2141 on Ubuntu 18.10 (cosmic) - medium.
    2016-06-30
    oval:com.ubuntu.precise:def:20162141000
    V
    CVE-2016-2141 on Ubuntu 12.04 LTS (precise) - medium.
    2016-06-30
    BACK
    redhat jboss enterprise application platform 5.2.0
    redhat jboss enterprise application platform 6
    redhat jboss data virtualization *
    redhat jboss enterprise application platform *
    redhat jboss data grid *
    redhat jboss bpm suite *
    redhat jboss brms 5.1.0
    redhat jboss enterprise application platform 6.4.8
    redhat jboss enterprise application platform 7.0
    redhat jboss fuse service works 6.0
    redhat single sign-on 7.0
    oracle knowledge 8.6.0
    oracle knowledge 8.6.1