rhsa-2024_1860
Vulnerability from csaf_redhat
Published
2024-04-16 19:55
Modified
2024-11-07 14:22
Summary
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 enhancement and security update on RHEL 7

Notes

Topic
New Red Hat Single Sign-On 7.6.8 deliverables are now available for Red Hat Enterprise Linux 7. This is an enhancement and security update with Important impact rating and package name 'rh-sso7-keycloak'. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.8 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.7, and includes bug fixes, security updates and enhancements which are linked to in the References. Security Fix(es): * Authorization Bypass (CVE-2023-6544) * Log Injection during WebAuthn authentication or registration (CVE-2023-6484) * path transversal in redirection validation (CVE-2024-1132) * unvalidated cross-origin messages in checkLoginIframe leads to DDoS (CVE-2024-1249) * undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol (CVE-2024-1635) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "New Red Hat Single Sign-On 7.6.8 deliverables are now available for Red Hat Enterprise Linux 7.\n\nThis is an enhancement and security update with Important impact rating and package name \u0027rh-sso7-keycloak\u0027. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.8 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.7, and includes bug fixes, security updates and\nenhancements which are linked to in the References.\n\nSecurity Fix(es):\n\n* Authorization Bypass (CVE-2023-6544)\n* Log Injection during WebAuthn authentication or registration (CVE-2023-6484)\n* path transversal in redirection validation (CVE-2024-1132)\n* unvalidated cross-origin messages in checkLoginIframe leads to DDoS (CVE-2024-1249)\n* undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol (CVE-2024-1635)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:1860",
        "url": "https://access.redhat.com/errata/RHSA-2024:1860"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2248423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248423"
      },
      {
        "category": "external",
        "summary": "2253116",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253116"
      },
      {
        "category": "external",
        "summary": "2262117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262117"
      },
      {
        "category": "external",
        "summary": "2262918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262918"
      },
      {
        "category": "external",
        "summary": "2264928",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264928"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1860.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 enhancement and security update on RHEL 7",
    "tracking": {
      "current_release_date": "2024-11-07T14:22:13+00:00",
      "generator": {
        "date": "2024-11-07T14:22:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2024:1860",
      "initial_release_date": "2024-04-16T19:55:02+00:00",
      "revision_history": [
        {
          "date": "2024-04-16T19:55:02+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-16T19:55:02+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-07T14:22:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server",
                "product": {
                  "name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server",
                  "product_id": "7Server-RHSSO-7.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Single Sign-On"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
                "product": {
                  "name": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
                  "product_id": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.13-1.redhat_00001.1.el7sso?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
                "product": {
                  "name": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
                  "product_id": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.13-1.redhat_00001.1.el7sso?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
                "product": {
                  "name": "rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
                  "product_id": "rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.13-1.redhat_00001.1.el7sso?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
          "product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
        },
        "product_reference": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
        "relates_to_product_reference": "7Server-RHSSO-7.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
          "product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src"
        },
        "product_reference": "rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
        "relates_to_product_reference": "7Server-RHSSO-7.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
          "product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
        },
        "product_reference": "rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
        "relates_to_product_reference": "7Server-RHSSO-7.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-6484",
      "cwe": {
        "id": "CWE-117",
        "name": "Improper Output Neutralization for Logs"
      },
      "discovery_date": "2023-11-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2248423"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A log injection flaw was found in Keycloak. A text string may be injected through the authentication form when using the WebAuthn authentication mode. This issue may have a minor impact to the logs integrity.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "keycloak: Log Injection during WebAuthn authentication or registration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-6484"
        },
        {
          "category": "external",
          "summary": "RHBZ#2248423",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248423"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6484",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-6484"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6484",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6484"
        }
      ],
      "release_date": "2023-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-16T19:55:02+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1860"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "keycloak: Log Injection during WebAuthn authentication or registration"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bastian Kanbach"
          ],
          "organization": "Secure Systems DE [bastian.kanbach@securesystems.de]"
        }
      ],
      "cve": "CVE-2023-6544",
      "cwe": {
        "id": "CWE-625",
        "name": "Permissive Regular Expression"
      },
      "discovery_date": "2023-12-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2253116"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardize an environment with this specific Dynamic Client Registration and TrustedDomain configuration previously unauthorized.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "keycloak: Authorization Bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Due to the high complexity of this attack, Red Hat considers this a Moderate impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-6544"
        },
        {
          "category": "external",
          "summary": "RHBZ#2253116",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253116"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6544",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-6544"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6544",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6544"
        }
      ],
      "release_date": "2024-04-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-16T19:55:02+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1860"
        },
        {
          "category": "workaround",
          "details": "No mitigation is currently available for this flaw.",
          "product_ids": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "keycloak: Authorization Bypass"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Axel Flamcourt"
          ]
        }
      ],
      "cve": "CVE-2024-1132",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "discovery_date": "2024-01-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2262117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "keycloak: path transversal in redirection validation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Build of Quarkus is not impacted as this CVE affects the server-side Keycloak execution, but Quarkus only acts as a Keycloak client in its quarkus-keycloak-authorization extension. For this reason, Quarkus is marked as having a Low impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-1132"
        },
        {
          "category": "external",
          "summary": "RHBZ#2262117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-1132",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-1132"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1132",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1132"
        }
      ],
      "release_date": "2024-04-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-16T19:55:02+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1860"
        },
        {
          "category": "workaround",
          "details": "No current mitigation is available for this vulnerability.",
          "product_ids": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "keycloak: path transversal in redirection validation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Adriano M\u00e1rcio Monteiro"
          ]
        }
      ],
      "cve": "CVE-2024-1249",
      "cwe": {
        "id": "CWE-346",
        "name": "Origin Validation Error"
      },
      "discovery_date": "2024-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2262918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Keycloak\u0027s OIDC component in the \"checkLoginIframe,\" which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application\u0027s availability without proper origin validation for incoming messages.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The vulnerability in Keycloak\u0027s OIDC component allowing unvalidated cross-origin messages in the \"checkLoginIframe\" function represents an important severity issue due to its potential to cause significant disruption and resource exhaustion. Exploitation of this flaw can lead to a Denial of Service (DoS) condition, where malicious actors can overwhelm the server with a high volume of requests, impacting availability for legitimate users. The absence of proper origin validation means attackers can exploit this weakness relatively easily, leveraging automated scripts to flood the server within seconds.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-1249"
        },
        {
          "category": "external",
          "summary": "RHBZ#2262918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-1249",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-1249"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1249",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1249"
        }
      ],
      "release_date": "2024-04-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-16T19:55:02+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1860"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS"
    },
    {
      "cve": "CVE-2024-1635",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-02-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2264928"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. \r\n\r\nAt HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This is rated as Important due to the fact that this might be an unauthenticated remote issue exploited by a malicious user, causing a denial of service (DoS) to the affected server.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
          "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-1635"
        },
        {
          "category": "external",
          "summary": "RHBZ#2264928",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264928"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-1635",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-1635"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1635",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1635"
        }
      ],
      "release_date": "2023-10-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-16T19:55:02+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1860"
        },
        {
          "category": "workaround",
          "details": "No mitigation is currently available for this vulnerability. However, there might be some protections, such as request limits by a load balancer in front of JBoss EAP/Wildfly or even Undertow, that could minimize the impact.",
          "product_ids": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.noarch",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.13-1.redhat_00001.1.el7sso.src",
            "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.13-1.redhat_00001.1.el7sso.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.