exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2017-0249-01

Red Hat Security Advisory 2017-0249-01
Posted Feb 3, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0249-01 - Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules and BPMN2-compliant business processes. This release of Red Hat JBoss BPM Suite 6.4.1 serves as a replacement for Red Hat JBoss BPM Suite 6.4.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Multiple security issues have been addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2016-2175, CVE-2016-4434, CVE-2016-6344, CVE-2016-7033
SHA-256 | 9d51aac2883a730212656b77c265059107cc080452c8f58055fcabe65e8f7390

Red Hat Security Advisory 2017-0249-01

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss BPM Suite security update
Advisory ID: RHSA-2017:0249-01
Product: Red Hat JBoss BPM Suite
Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0249.html
Issue date: 2017-02-02
CVE Names: CVE-2016-2175 CVE-2016-4434 CVE-2016-6344
CVE-2016-7033
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss BPM Suite.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat JBoss BPM Suite is a business rules and processes management system
for the management, storage, creation, modification, and deployment of
JBoss rules and BPMN2-compliant business processes.

This release of Red Hat JBoss BPM Suite 6.4.1 serves as a replacement for
Red Hat JBoss BPM Suite 6.4.0, and includes bug fixes and enhancements,
which are documented in the Release Notes document linked to in the
References.

Security Fix(es):

* It was found that the parsing of XMP and other XML formats in PDF by
Apache PDFBox would expand entity references. A remote, unauthenticated
attacker could use this flaw to read files accessible to the user running
the application server, and potentially perform other more advanced XXE
attacks. (CVE-2016-2175)

* It was found that the parsing of OOXML, XMP in PDF, and some other file
formats by Apache Tika would expand entity references. A remote,
unauthenticated attacker could use this flaw to read files accessible to
the user running the application server, and potentially perform other more
advanced XXE attacks. (CVE-2016-4434)

* It was discovered that JBoss BRMS 6 and BPM Suite 6 are not setting
HttpOnly flags on sensitive cookies. Remote attackers can access these
cookies by using client-side scripts, usually through XSS. Please note that
on IBM WebSphere the HttpOnly flag cannot be set by deployed applications,
it needs to be configured directly on WAS console. (CVE-2016-6344)

* JBoss BRMS 6 and BPM Suite 6 are vulnerable to a stored XSS via
dashbuilder. Remote, authenticated attackers that have privileges to access
dashbuilder (usually admins) can store scripts in several editable fields,
which are not properly sanitized before showing to other users, including
other admins. (CVE-2016-7033)

The CVE-2016-6344 and CVE-2016-7033 issues were discovered by Jeremy Choi
(Red Hat Product Security Team).

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

It is recommended to halt the server by stopping the JBoss Application
Server process before installing this update; after installing the update,
restart the server by starting the JBoss Application Server process.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1340386 - CVE-2016-4434 tika: XML External Entity vulnerability
1340396 - CVE-2016-2175 pdfbox: XML External Entity vulnerability
1371807 - CVE-2016-6344 JBoss bpms 6.3.x cookie does not set httponly
1373344 - CVE-2016-7033 JBoss bpms: stored XSS in dashbuilder

5. References:

https://access.redhat.com/security/cve/CVE-2016-2175
https://access.redhat.com/security/cve/CVE-2016-4434
https://access.redhat.com/security/cve/CVE-2016-6344
https://access.redhat.com/security/cve/CVE-2016-7033
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite&downloadType=securityPatches&version=6.4

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFYk53NXlSAg2UNWIIRAnzqAKCCq1aTRTBmIkbfdflQ2YyFuExFPACfRKTR
wILlylWyfdggelP/o30rv+g=
=H6Hz
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close