Vulnerability Name: | CVE-2016-2141 (CCN-114439) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-06-24 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2016-06-24 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-04-26 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | |||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-2141 Source: CCN Type: RHSA-2016-1328 Critical: Red Hat JBoss Enterprise Application Platform 5.2 security update Source: CCN Type: RHSA-2016-1329 Critical: Red Hat JBoss Enterprise Application Platform 5.2 security update Source: CCN Type: RHSA-2016-1330 Critical: Red Hat JBoss Enterprise Application Platform 6.4 security update Source: CCN Type: RHSA-2016-1331 Critical: Red Hat JBoss Enterprise Application Platform 6.4 security update Source: CCN Type: RHSA-2016-1332 Critical: Red Hat JBoss Enterprise Application Platform 7.0 security update Source: CCN Type: RHSA-2016-1333 Critical: Red Hat JBoss Enterprise Application Platform 7.0 security update Source: CCN Type: RHSA-2016-1334 Critical: Red Hat JBoss Data Grid 6.6 security update Source: CCN Type: RHSA-2016-1345 Critical: Red Hat JBoss BRMS security update Source: CCN Type: RHSA-2016-1346 Critical: Red Hat JBoss Data Virtualization security and bug fix update Source: CCN Type: RHSA-2016-1347 Critical: Red Hat JBoss BPM Suite security update Source: CCN Type: RHSA-2016-1374 Critical: Red Hat JBoss Portal 6.2.0 security update Source: CCN Type: RHSA-2016-1376 Critical: Red Hat JBoss SOA Platform security update Source: CCN Type: RHSA-2016-1389 Critical: Red Hat JBoss Fuse Service Works security update Source: CCN Type: RHSA-2016-1432 Critical: jboss-ec2-eap security, bug fix, and enhancement update Source: CCN Type: RHSA-2016-1433 Critical: Red Hat JBoss Enterprise Application Platform 6.4.9 update Source: CCN Type: RHSA-2016-1434 Critical: Red Hat JBoss Enterprise Application Platform update Source: CCN Type: RHSA-2016-1435 Critical: Red Hat JBoss Enterprise Application Platform 6.4.9 update Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: CCN Type: RHSA-2016-1439 Critical: Red Hat Single Sign-On security update Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: CCN Type: RHSA-2016-2035 Important: Red Hat JBoss Fuse 6.3 security update Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: CCN Type: SECTRACK ID: 1036165 JBoss Authentication Flaw in JGroups Lets Remote Users Bypass Security Restrictions on the Target System Source: CCN Type: Oracle CPUApr2019 Oracle Critical Patch Update Advisory - April 2019 Source: CCN Type: BID-91481 JGroups CVE-2016-2141 Authorization Bypass Vulnerability Source: secalert@redhat.com Type: VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Broken Link, Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: CCN Type: Red Hat Bugzilla Bug 1313589 (CVE-2016-2141) CVE-2016-2141 Authorization bypass in JGroups Source: XF Type: UNKNOWN redhat-jboss-cve20162141-sec-bypass(114439) Source: secalert@redhat.com Type: Issue Tracking, Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Broken Link, Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Broken Link, Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Broken Link, Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Patch, Third Party Advisory secalert@redhat.com Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-2141 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |