HTTP-invoker vulnerabity/ bug in ALM 11?
Question ID: 105435
0
0

Hi,
We are concerned about the discovered http-invoker bug/ vulnerabiltity within alm ll. HOw can we close this issue if it is possible to protect our systems further?

Marked as spam
Posted by (Questions: 379, Answers: 35)
Asked on June 6, 2014 7:42 pm
39 views
Answers (1)
1
Private answer

HI Homer,

This issue I beleieve that you are asking about is with the JBoss https invoker is an issue that existed in versions 4 and 5. This security loophole has been closed within versions 6 and 7 so depending on the version you are running it, may not be an issue for you. You can still apply the fix if you are worried about it. I am including the document from HP regarding this issue. It is simply deleting the http-invoker.sar file and then restarting the services. Here are the steps:

Remove the http-invoker.sar component completely
For cluster deployment, do the following steps on each node.
????
Solution
???
Go to /jboss/server/default/deploy
(Where is the path where the ALM is installed)
Delete the http-invoker.sar directory Restart the ALM server.
Secure configuration of http-invoker.sar component

If you choose not to remove the http-invoker.sar component, follow JBoss documentation on configuration
for securing the component.

If you look at the log files it should list the java version within it. IT will be listed as java.version and will be a 1. x.x_x number, such as 1.6.0_17. The first x in this case the 6 is the java version number of the naming convention.

Here is another way to find the version if debug is enabled:
http://eyeontesting.com/questions/5661/how-can-i-tell-which-version-of-java-my-qcalm-vers.html

Hope this helps.

Marked as spam
Posted by (Questions: 0, Answers: 770)
Answered on June 6, 2014 7:53 pm
0
Thanks that is exactly what I was looking for.
( at June 9, 2014 1:51 pm)
EyeOnTesting

Welcome back to "EyeOnTesting" brought to you by Orasi Software, Inc.

X
Scroll to Top