{"id":"CVE-2016-8627","details":"admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired.","modified":"2026-05-15T12:03:19.558118301Z","published":"2018-05-11T13:29:00.237Z","database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*","cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:jboss_enterprise_application_platform","source":"CPE_FIELD","extracted_events":[{"last_affected":"6.4.0"},{"last_affected":"7.1.0"}]}]},"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0170.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0171.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0172.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0173.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0244.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0245.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0246.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0247.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0250.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95698"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037660"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3454"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3455"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3456"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3458"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8627"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}