rhsa-2011_1806
Vulnerability from csaf_redhat
Published
2011-12-08 20:07
Modified
2024-11-05 17:38
Summary
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.2 update

Notes

Topic
JBoss Enterprise Web Platform 5.1.2, which fixes one security issue, various bugs, and adds several enhancements is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
Details
The Enterprise Web Platform is a slimmed down profile of the JBoss Enterprise Application Platform intended for mid-size workloads with light and rich Java applications. OpenID4Java allows you to implement OpenID authentication in your Java applications. OpenID4Java is a Technology Preview. This JBoss Enterprise Web Platform 5.1.2 release serves as a replacement for JBoss Enterprise Web Platform 5.1.1. This update includes bug fixes and enhancements. JBoss Enterprise Web Platform is a subset of JBoss Enterprise Application Platform. Users are directed to the JBoss Enterprise Application Platform 5.1.2 Release Notes for information on the most significant of these changes. The Release Notes will be available shortly from https://docs.redhat.com/docs/en-US/index.html The following security issue is also fixed with this release: It was found that the Attribute Exchange (AX) extension of OpenID4Java was not checking to ensure attributes were signed. If AX was being used to receive information that an application only trusts the identity provider to assert, a remote attacker could use this flaw to conduct man-in-the-middle attacks and compromise the integrity of the information via a specially-crafted request. By default, only the JBoss Seam openid example application uses OpenID4Java. (CVE-2011-4314) Warning: Before applying this update, back up the "jboss-as-web/server/[PROFILE]/deploy/" directory and any other customized configuration files of your JBoss Enterprise Web Platform. All users of JBoss Enterprise Web Platform 5.1.1 as provided from the Red Hat Customer Portal are advised to upgrade to JBoss Enterprise Web Platform 5.1.2.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "JBoss Enterprise Web Platform 5.1.2, which fixes one security issue,\nvarious bugs, and adds several enhancements is now available from the Red\nHat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The Enterprise Web Platform is a slimmed down profile of the JBoss\nEnterprise Application Platform intended for mid-size workloads with light\nand rich Java applications. OpenID4Java allows you to implement OpenID\nauthentication in your Java applications. OpenID4Java is a Technology\nPreview.\n\nThis JBoss Enterprise Web Platform 5.1.2 release serves as a replacement\nfor JBoss Enterprise Web Platform 5.1.1.\n\nThis update includes bug fixes and enhancements. JBoss Enterprise Web\nPlatform is a subset of JBoss Enterprise Application Platform. Users are\ndirected to the JBoss Enterprise Application Platform 5.1.2 Release Notes\nfor information on the most significant of these changes. The Release Notes\nwill be available shortly from\nhttps://docs.redhat.com/docs/en-US/index.html\n\nThe following security issue is also fixed with this release:\n\nIt was found that the Attribute Exchange (AX) extension of OpenID4Java was\nnot checking to ensure attributes were signed. If AX was being used to\nreceive information that an application only trusts the identity provider\nto assert, a remote attacker could use this flaw to conduct\nman-in-the-middle attacks and compromise the integrity of the information\nvia a specially-crafted request. By default, only the JBoss Seam openid\nexample application uses OpenID4Java. (CVE-2011-4314)\n\nWarning: Before applying this update, back up the\n\"jboss-as-web/server/[PROFILE]/deploy/\" directory and any other customized\nconfiguration files of your JBoss Enterprise Web Platform.\n\nAll users of JBoss Enterprise Web Platform 5.1.1 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise Web Platform\n5.1.2.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:1806",
        "url": "https://access.redhat.com/errata/RHSA-2011:1806"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/docs/en-US/index.html",
        "url": "https://docs.redhat.com/docs/en-US/index.html"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform\u0026downloadType=distributions",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform\u0026downloadType=distributions"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/support/offerings/techpreview/",
        "url": "https://access.redhat.com/support/offerings/techpreview/"
      },
      {
        "category": "external",
        "summary": "754386",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1806.json"
      }
    ],
    "title": "Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.2 update",
    "tracking": {
      "current_release_date": "2024-11-05T17:38:58+00:00",
      "generator": {
        "date": "2024-11-05T17:38:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2011:1806",
      "initial_release_date": "2011-12-08T20:07:00+00:00",
      "revision_history": [
        {
          "date": "2011-12-08T20:07:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-12-08T20:07:08+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-05T17:38:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Platform 5.1",
                "product": {
                  "name": "Red Hat JBoss Web Platform 5.1",
                  "product_id": "Red Hat JBoss Web Platform 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Platform"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2011-4314",
      "discovery_date": "2011-11-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "754386"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "extension): MITM due to improper validation of AX attribute signatures",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Platform 5.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-4314"
        },
        {
          "category": "external",
          "summary": "RHBZ#754386",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4314",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-4314"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314"
        }
      ],
      "release_date": "2011-05-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-12-08T20:07:00+00:00",
          "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Platform 5.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1806"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Platform 5.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "extension): MITM due to improper validation of AX attribute signatures"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.