CVE-2009-0027
09.03.2009, 21:30
The request handler in JBossWS in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP06 and 4.3 before 4.3.0.CP04 does not properly validate the resource path during a request for a WSDL file with a custom web-service endpoint, which allows remote attackers to read arbitrary XML files via a crafted request.Enginsight
Vendor | Product | Version |
---|---|---|
redhat | jboss_enterprise_application_platform | 4.2.0:cp01 |
redhat | jboss_enterprise_application_platform | 4.2.0:cp02 |
redhat | jboss_enterprise_application_platform | 4.2.0:cp03 |
redhat | jboss_enterprise_application_platform | 4.2.0:cp04 |
redhat | jboss_enterprise_application_platform | 4.2.0:cp05 |
redhat | jboss_enterprise_application_platform | 4.2.0:cp06 |
redhat | jboss_enterprise_application_platform | 4.3.0:cp01 |
redhat | jboss_enterprise_application_platform | 4.3.0:cp02 |
redhat | jboss_enterprise_application_platform | 4.3.0:cp03 |
redhat | jboss_enterprise_application_platform | 4.3.0:cp04 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References