exploit the possibilities

Red Hat Security Advisory 2020-3585-01

Red Hat Security Advisory 2020-3585-01
Posted Aug 31, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3585-01 - Red Hat JBoss Enterprise Application Platform CD20 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform CD20 includes bug fixes and enhancements. Issues addressed include XML injection, deserialization, man-in-the-middle, memory exhaustion, remote SQL injection, and traversal vulnerabilities.

tags | advisory, java, remote, vulnerability, sql injection
systems | linux, redhat
advisories | CVE-2018-14371, CVE-2019-10172, CVE-2019-14900, CVE-2020-10673, CVE-2020-10683, CVE-2020-10705, CVE-2020-10714, CVE-2020-10719, CVE-2020-10740, CVE-2020-11612, CVE-2020-1719, CVE-2020-1954, CVE-2020-6950
MD5 | 4d987f9115fdafa0c21851c89ed7fed7

Red Hat Security Advisory 2020-3585-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: EAP Continuous Delivery Technical Preview Release 20 security update
Advisory ID: RHSA-2020:3585-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3585
Issue date: 2020-08-31
CVE Names: CVE-2018-14371 CVE-2019-10172 CVE-2019-14900
CVE-2020-1719 CVE-2020-1954 CVE-2020-6950
CVE-2020-10673 CVE-2020-10683 CVE-2020-10705
CVE-2020-10714 CVE-2020-10719 CVE-2020-10740
CVE-2020-11612
====================================================================
1. Summary:

This is a security update for JBoss EAP Continuous Delivery 20.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform CD20 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform CD20 includes
bug fixes and enhancements.

Security Fix(es):

* jsf-impl: mojarra: Path traversal in
ResourceManager.java:getLocalePrefix() via the loc parameter
(CVE-2018-14371)

* jackson-mapper-asl: XML external entity similar to CVE-2016-3720
(CVE-2019-10172)

* hibernate-core: hibernate: SQL injection issue in Hibernate ORM
(CVE-2019-14900)

* jackson-databind: mishandles the interaction between serialization
gadgets and typing which could result in remote command execution
(CVE-2020-10673)

* dom4j: XML External Entity vulnerability in default SAX parser
(CVE-2020-10683)

* undertow: Memory exhaustion issue in HttpReadListener via "Expect:
100-continue" header (CVE-2020-10705)

* wildfly-elytron: session fixation when using FORM authentication
(CVE-2020-10714)

* undertow: invalid HTTP request with large chunk size (CVE-2020-10719)

* wildfly: unsafe deserialization in Wildfly Enterprise Java Beans
(CVE-2020-10740)

* netty: compression/decompression codecs don't enforce limits on buffer
allocation sizes (CVE-2020-11612)

* wildfly: EJBContext principal is not popped back after invoking another
EJB using a different Security Domain (CVE-2020-1719)

* cxf-core: cxf: JMX integration is vulnerable to a MITM attack
(CVE-2020-1954)

* jsf-impl: Mojarra: Path traversal via either the loc parameter or the con
parameter, incomplete fix of CVE-2018-14371 (CVE-2020-6950)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

You must restart the JBoss server process for the update to take effect.

The References section of this erratum contains a download link (you must
log in to download the update)

4. Bugs fixed (https://bugzilla.redhat.com/):

1607709 - CVE-2018-14371 mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter
1666499 - CVE-2019-14900 hibernate: SQL injection issue in Hibernate ORM
1694235 - CVE-2020-10683 dom4j: XML External Entity vulnerability in default SAX parser
1715075 - CVE-2019-10172 jackson-mapper-asl: XML external entity similar to CVE-2016-3720
1796617 - CVE-2020-1719 Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain
1803241 - CVE-2020-10705 undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header
1805006 - CVE-2020-6950 Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371
1815470 - CVE-2020-10673 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
1816216 - CVE-2020-11612 netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
1824301 - CVE-2020-1954 cxf: JMX integration is vulnerable to a MITM attack
1825714 - CVE-2020-10714 wildfly-elytron: session fixation when using FORM authentication
1828459 - CVE-2020-10719 undertow: invalid HTTP request with large chunk size
1834512 - CVE-2020-10740 wildfly: unsafe deserialization in Wildfly Enterprise Java Beans

5. References:

https://access.redhat.com/security/cve/CVE-2018-14371
https://access.redhat.com/security/cve/CVE-2019-10172
https://access.redhat.com/security/cve/CVE-2019-14900
https://access.redhat.com/security/cve/CVE-2020-1719
https://access.redhat.com/security/cve/CVE-2020-1954
https://access.redhat.com/security/cve/CVE-2020-6950
https://access.redhat.com/security/cve/CVE-2020-10673
https://access.redhat.com/security/cve/CVE-2020-10683
https://access.redhat.com/security/cve/CVE-2020-10705
https://access.redhat.com/security/cve/CVE-2020-10714
https://access.redhat.com/security/cve/CVE-2020-10719
https://access.redhat.com/security/cve/CVE-2020-10740
https://access.redhat.com/security/cve/CVE-2020-11612
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&productêp-cd&version
https://access.redhat.com/documentation/en-us/jboss_enterprise_application_platform_continuous_delivery/20/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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chfE
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    29 Files
  • 21
    Jan 21st
    12 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    17 Files
  • 25
    Jan 25th
    34 Files
  • 26
    Jan 26th
    23 Files
  • 27
    Jan 27th
    24 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close