Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2074 Moderate: Red Hat Single Sign-On 7.3.2 security update 12 June 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat Single Sign-On 7.3.2 Publisher: Red Hat Operating System: Red Hat Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Remote with User Interaction Provide Misleading Information -- Remote/Unauthenticated Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-11358 CVE-2019-10157 CVE-2019-8331 CVE-2019-3888 CVE-2019-3875 CVE-2019-3873 CVE-2019-3872 CVE-2018-20677 CVE-2018-20676 CVE-2018-14041 CVE-2016-10735 Reference: ESB-2019.2065.2 ESB-2019.2037 ESB-2019.1806 ESB-2019.1571 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:1456 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Single Sign-On 7.3.2 security update Advisory ID: RHSA-2019:1456-01 Product: Red Hat Single Sign-On Advisory URL: https://access.redhat.com/errata/RHSA-2019:1456 Issue date: 2019-06-11 CVE Names: CVE-2016-10735 CVE-2018-14041 CVE-2018-20676 CVE-2018-20677 CVE-2019-3872 CVE-2019-3873 CVE-2019-3875 CVE-2019-3888 CVE-2019-8331 CVE-2019-10157 CVE-2019-11358 ===================================================================== 1. Summary: A security update is now available for Red Hat Single Sign-On 7.3 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.3.2 serves as a replacement for Red Hat Single Sign-On 7.3.1, and includes bug fixes and enhancements, which are documented in the Release Notes document. Security Fix(es): * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy (CVE-2018-14041) * bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) * bootstrap: XSS in the affix configuration target property (CVE-2018-20677) * picketlink: reflected XSS in SAMLRequest via RelayState parameter (CVE-2019-3872) * picketlink: URL injection via xinclude parameter (CVE-2019-3873) * keycloak: X.509 authentication: CRL signatures are not verified (CVE-2019-3875) * undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * keycloak: Node.js adapter internal NBF can be manipulated (CVE-2019-10157) * js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 1601616 - CVE-2018-14041 bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy 1668082 - CVE-2018-20676 bootstrap: XSS in the tooltip data-viewport attribute 1668089 - CVE-2018-20677 bootstrap: XSS in the affix configuration target property 1668097 - CVE-2016-10735 bootstrap: XSS in the data-target attribute 1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute 1688966 - CVE-2019-3872 picketlink: reflected XSS in SAMLRequest via RelayState parameter 1689014 - CVE-2019-3873 picketlink: URL injection via xinclude parameter 1690628 - CVE-2019-3875 keycloak: missing signatures validation on CRL used to verify client certificates 1693777 - CVE-2019-3888 undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed 1701972 - CVE-2019-11358 js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection 1702953 - CVE-2019-10157 keycloak: Node.js adapter internal NBF can be manipulated leading to DoS. 5. References: https://access.redhat.com/security/cve/CVE-2016-10735 https://access.redhat.com/security/cve/CVE-2018-14041 https://access.redhat.com/security/cve/CVE-2018-20676 https://access.redhat.com/security/cve/CVE-2018-20677 https://access.redhat.com/security/cve/CVE-2019-3872 https://access.redhat.com/security/cve/CVE-2019-3873 https://access.redhat.com/security/cve/CVE-2019-3875 https://access.redhat.com/security/cve/CVE-2019-3888 https://access.redhat.com/security/cve/CVE-2019-8331 https://access.redhat.com/security/cve/CVE-2019-10157 https://access.redhat.com/security/cve/CVE-2019-11358 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso&downloadType=securityPatches&version=7.3 https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/ 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXP/Js9zjgjWX9erEAQhq+xAAhN99EmwW27VDe/PAp8jM6sL8bSiqIVTf FfrjFhnreCeQHRHm9ySzj5XJD3U8HhFs/RkNf7lacfAV+LZ4TJffNBdaUJAezcXQ 5Xa8BakQ8mkC2bmZydujtaRuu78iOydmitAU1dTCifWreUHi8HKubio8Uk7hW7jJ 7VijR2ItqBestpz5KqOLlvuAzh+K47wft7oI/ga+rMxeIA5N971fkLlqK8pkovVJ N23fyRzobPdCzhPyCunRD3LFee2/GLZz0uxYX1OwG3f3JPpNjjhhQ7Fb4UN/9dMC KycaylIfdZIYTgehBe5jQVU0t/WMFw05EvkNP0IqQDCUplVEHa0HlaJXqmFE1KOy eug573jEBW5NLBfqihNy2XDjuktp540KTec3t67DsnNelr2NC28fVHi0XTZxyCwg QpzPyl5i9kOui3fqGCTxBO28RMSJGQU1cI7wyNWfHZ63v3kzscdvXwvXY9asWK9M N2SpKMRlb0190lRlU4XYqGeaFHO/FtYiLrieujV/1hhyoyzT9ocuKfcKv/yKJZ5o XoAPINBcfhk932o39EDJk5UA/h0p5mKMN2hDJHGC3HCsle5uqAmCj0m+1PXQQhTd Df2yZpcIeNad6et7UlwY3sAhFWJQ1VN9ME8BIphKu5CqInAZtZKrYGByvOdqVbX7 8QsAY6H6R80= =rceQ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXQBO5WaOgq3Tt24GAQjQvg//ZlsEfv0rZWRdByQY2weWcxGDpnYys2GO p9jY5TT9LIDhpSc4Ez+A4/cK0D+yB9lKec6+eLupsk1o1rXTllXpMzkJgHqGJ3G0 liHqLW5z/sM4EGsyZD7kJIadbwF6DRPzL108Mh4FIaL1gvHXG8NScSuiVjPnjYVB xcmeE8/JaR/L1nKZT3EmGmstIPZPMorLqcX2iG6hdw06HIhYKWVRWqfGdUpA4ol9 F5wkTe3j7f7VTCp7AVdH+dzK7So3m2ilhYIw75w6UoHwBXdnPSdiV9ahMOuet0iq se104F9JrDKpa8JlNu48onSO2tdvOQewB9ZwFBE6X59gOkWkmHSI1hplsKHki7yM CLdZiZrQjMmLj0gxnnLYRCx/B6X4WIe70W0D99Z5oEMjRmngpCcRwC8+JhBykgaQ 93HzCiCoDH3ZnMeEYSnFIl0ArDudW9YyHpBN35VE0gyyx4bDFXtA+uHAaaad7imz 6QCi1Eeu+Rf4EPRletTdK1pE8KusMLY5kiqjjZh9xzO3/0BsqYeoh76+udKX9qDX hRDjSMg7rqU3Isz0Vw+4ic1nsWArIgqrBOo9om1GpbvrOEkW68n9fUPBz3H+AUIC bBapEIPRTpCdo/wUsIu6jJo17S359SyWh40wVdx+i5LI583D2tFSE6Fw07s3uidN eY+kYtDaNow= =Kmty -----END PGP SIGNATURE-----