exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-3209-01

Red Hat Security Advisory 2020-3209-01
Posted Jul 29, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3209-01 - The release of Red Hat AMQ Online 1.5.2 serves as a replacement for AMQ Online 1.5.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. Issues addressed include XML injection and cross site request forgery vulnerabilities.

tags | advisory, vulnerability, csrf
systems | linux, redhat
advisories | CVE-2020-13692, CVE-2020-14319
SHA-256 | d53f4c95584a5321010758f4597001f52e3b2733be2f86f69434037c5d8129a3

Red Hat Security Advisory 2020-3209-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: AMQ Online 1.5.2 release and security update
Advisory ID: RHSA-2020:3209-01
Product: Red Hat JBoss AMQ
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3209
Issue date: 2020-07-29
Cross references: RHBA-2020:57503-01
CVE Names: CVE-2020-13692 CVE-2020-14319
====================================================================
1. Summary:

An update of the Red Hat OpenShift Container Platform 3.11 and 4.4/4.5
container images is now available for Red Hat AMQ Online.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

The release of Red Hat AMQ Online 1.5.2 serves as a replacement for AMQ
Online 1.5.1, and includes bug fixes and enhancements, which are documented
in the Release Notes document linked in the References.

Security Fix(es):

* AMQ Online: CSRF in graphQL requests (CVE-2020-14319)

* postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
(CVE-2020-13692)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

The Red Hat OpenShift Container Platform 3.11 and 4.4/4.5 container images
provided by this update can be downloaded from the Red Hat Container
Registry at registry.access.redhat.com. Installation instructions for your
platform are available from https://access.redhat.com.

Dockerfiles and scripts should be amended either to refer to this new image
specifically, or to the latest image generally.

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

4. Bugs fixed (https://bugzilla.redhat.com/):

1852985 - CVE-2020-13692 postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
1854373 - CVE-2020-14319 amq-on: CSRF (in graphQL requests)

5. References:

https://access.redhat.com/security/cve/CVE-2020-13692
https://access.redhat.com/security/cve/CVE-2020-14319
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jboss.amq.online&version=1.5.2
https://access.redhat.com/documentation/en-us/red_hat_amq/7.7/html/release_notes_for_amq_online_1.5_on_openshift/index

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXyGUKtzjgjWX9erEAQgw4g/+PTRUboI4VxkVtnCZptOiAZyVw9R+52XD
CpQUqtBJhmEpJxX4QVYHreu0cJw8ZDMqPs+IRRwi3Cl8Z8ExMovZqfNpIm+aV/Qy
yqdBK4qWMjKrjsT5U3F3r64eOmRP/dh0SALRjOVYMy/g1Ua132hT5MHUjzonggpe
V/HJJ6N+m7uxfBqceEz1bNKtTXQKRhQgoXbLlVRCfbqt1+mEeigZVEi/eCOJrQc/
AUqs54WsufFJVYsNGtnb0rV1lZndnFkCNmHrJvxTCZf1DyOi1ZtZRxP51GnxPWcm
W6jSO1VD3lfIW8iVnBsNe/6y2ObAyVcgZmsADhrMrrNWwwbEEKgVL32S2n9mSel2
M6TlHoq7PabNbIMsTeaCc2wsYR2wPVbgGMOfhYjIeXE/ofMuUHCc8cqdx4IzHYIG
mpcU2PS3Nuf54lARNuNgkA4A6UKhXeiOZpxv+pJ3wK9yptor1AmZSaqMt6ph5fw0
wHeb/9DQo1upjkP20XMG1N1InpGr/du/NiLi7FN+FCE1XMPBmUVUS35cnz+q1wok
BurzgAmTzdlGkGEYzGC/WnT2GpiyfUYLId3Gxvmg4MRIyNXUPglQmMynJ/tbWLpS
KFsGhL6yZ+3R65HZpMfQUN+v03RGMPJkpRMQjwcX8kjSbIlXE5qCX7BccSYLYgt3
Y0qld5QMYwo=bs2Z
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close