-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Single Sign-On 7.4.3 security update Advisory ID: RHSA-2020:4931-01 Product: Red Hat Single Sign-On Advisory URL: https://access.redhat.com/errata/RHSA-2020:4931 Issue date: 2020-11-04 CVE Names: CVE-2020-1954 CVE-2020-10776 CVE-2020-14299 CVE-2020-14338 CVE-2020-14340 CVE-2020-14389 ==================================================================== 1. Summary: A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.3 serves as a replacement for Red Hat Single Sign-On 7.4.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * picketbox: JBoss EAP reload to admin-only mode allows authentication bypass (CVE-2020-14299) * wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl (CVE-2020-14338) * xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS (CVE-2020-14340) * keycloak: user can manage resources with just "view-profile" role using new Account Console (CVE-2020-14389) * cxf: JMX integration is vulnerable to a MITM attack (CVE-2020-1954) * keycloak: OIDC redirect_uri allows dangerous schemes resulting in potential XSS (CVE-2020-10776) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 1824301 - CVE-2020-1954 cxf: JMX integration is vulnerable to a MITM attack 1847428 - CVE-2020-10776 keycloak: OIDC redirect_uri allows dangerous schemes resulting in potential XSS 1848533 - CVE-2020-14299 picketbox: JBoss EAP reload to admin-only mode allows authentication bypass 1860054 - CVE-2020-14338 wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl 1860218 - CVE-2020-14340 xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS 1875843 - CVE-2020-14389 keycloak: user can manage resources with just "view-profile" role using new Account Console 5. References: https://access.redhat.com/security/cve/CVE-2020-1954 https://access.redhat.com/security/cve/CVE-2020-10776 https://access.redhat.com/security/cve/CVE-2020-14299 https://access.redhat.com/security/cve/CVE-2020-14338 https://access.redhat.com/security/cve/CVE-2020-14340 https://access.redhat.com/security/cve/CVE-2020-14389 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso&downloadType=securityPatches&version=7.4 https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.4/ 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX6MAHdzjgjWX9erEAQg8hw//Xh9pKxtbqpJsu8pmmN+wkcDmJWlB/Bsk u/kqL5ujUMPw3D+g9blvu5kahSNslhtE7eF9+wPderPoQqtzCs2CwMO6e4Ea0MS5 +BbO6oERnjKmKZOFyPxPJ7iKSsSRvO9+XNFjOJdy+Br2umzPEZ0vx3TaIp35m4Wk QAJXbPtSuZ9b/ZEWI2EBzXHUBaHxl1BdF8fWRsmJHwOU0EHfualkafa/SpP5bkyJ GhKLNq6JYo9pxQ2TzLh1TEjfsTZ8qteDuJtQoQeW8u8HStam8NbXMBKVdLY180hA cxbnKEp7peB7zhqZ2m3vy/HLqXzpB7wdpCAa4VQk5wFYGx4M/taGfbGoeikLWvZ8 xCNEh2ZGKcHBANon2Z+sOCJUfdPwNmK5crhTqz7qrdRUhkjKwVHvx/QLj3ZXrKa8 4PEzmyJ3/oExctteFjWT1LYBmKXp9O2A7vb8pEKzUkSywmRwb4NShekd/oYosjLO aGvE5QcjIOEJXED6GQ1oSpgR2Sfg1JLYS+FyRHeQWuTrb1h0EFWUZmhpxvGh43/E J3MCHlEGCPYSOw+xWArCK8U4awywtICfDYMPk7YuPkODJ2v8ysHuNCSul1O2PiD+ I3M99OmdKVOqE6cFXFf9HVLUGgW/vTXciQE4ovITEoM8NM6AWfkmhGpDR6IbdpLn VnfnMrpXY2M=sxK6 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce