CVE-2021-3644

Source
https://cve.org/CVERecord?id=CVE-2021-3644
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3644.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-3644
Aliases
Downstream
Published
2022-08-26T16:15:09.163Z
Modified
2026-02-06T22:13:30.769328Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest threat from this vulnerability is data confidentiality and integrity.

References

Affected packages

Git / github.com/wildfly/wildfly

Affected ranges

Type
GIT
Repo
https://github.com/wildfly/wildfly
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

7.*
7.0.0.Alpha1
7.0.0.Alpha1-final
7.0.0.Beta1-prerelease
7.0.0.Beta2
7.0.0.Beta2-prerelease
7.0.0.Beta3
7.0.0.CR1
7.0.0.Final-prerelease

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3644.json"