CVE-2021-3644: wildfly-core allows user with access to management interface to access vault expression, retrieve item from vault
3.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3934%
CWE
-
Published
8/27/2022
Updated
1/31/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.wildfly.core:wildfly-server | maven | < 16.0.1.Final | 16.0.1.Final |
| org.wildfly.core:wildfly-server | maven | >= 17.0.0.Beta2, < 17.0.0.Beta3 | 17.0.0.Beta3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper sensitivity classification of vault expressions in multi-expression attributes. The commit diff shows the patched version replaced the original two-step check (ExpressionResolver.EXPRESSION_PATTERN followed by VaultReader.STANDARD_VAULT_PATTERN) with a single comprehensive regex (VAULT_EXPRESSION_PATTERN) that scans the entire attribute value. The test case added in VaultExpressionSensitivityTestCase.java demonstrates how an attacker could previously inject a vault expression alongside other content. The isSensitiveValue function's pre-patch logic failed to detect vault expressions when they weren't the sole expression in the attribute, making it the clear vulnerable function.