cve/2019/CVE-2019-14887.md

19 lines
990 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-14887](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14887)
![](https://img.shields.io/static/v1?label=Product&message=wildfly&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.2.0.GA%2C%207.2.3.GA%2C%207.2.5.CR2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-757&color=brighgreen)
### Description
A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/chnzzh/OpenSSL-CVE-lib