-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2074
          Moderate: Red Hat Single Sign-On 7.3.2 security update
                               12 June 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Single Sign-On 7.3.2
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
                   Provide Misleading Information  -- Remote/Unauthenticated      
                   Access Confidential Data        -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11358 CVE-2019-10157 CVE-2019-8331
                   CVE-2019-3888 CVE-2019-3875 CVE-2019-3873
                   CVE-2019-3872 CVE-2018-20677 CVE-2018-20676
                   CVE-2018-14041 CVE-2016-10735 

Reference:         ESB-2019.2065.2
                   ESB-2019.2037
                   ESB-2019.1806
                   ESB-2019.1571

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:1456

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Single Sign-On 7.3.2 security update
Advisory ID:       RHSA-2019:1456-01
Product:           Red Hat Single Sign-On
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:1456
Issue date:        2019-06-11
CVE Names:         CVE-2016-10735 CVE-2018-14041 CVE-2018-20676 
                   CVE-2018-20677 CVE-2019-3872 CVE-2019-3873 
                   CVE-2019-3875 CVE-2019-3888 CVE-2019-8331 
                   CVE-2019-10157 CVE-2019-11358 
=====================================================================

1. Summary:

A security update is now available for Red Hat Single Sign-On 7.3 from the
Customer Portal.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.3.2 serves as a replacement for
Red Hat Single Sign-On 7.3.1, and includes bug fixes and enhancements,
which are documented in the Release Notes document.

Security Fix(es):

* bootstrap: XSS in the data-target attribute (CVE-2016-10735)

* bootstrap: Cross-site Scripting (XSS) in the data-target property of
scrollspy (CVE-2018-14041)

* bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676)

* bootstrap: XSS in the affix configuration target property
(CVE-2018-20677)

* picketlink: reflected XSS in SAMLRequest via RelayState parameter
(CVE-2019-3872)

* picketlink: URL injection via xinclude parameter (CVE-2019-3873)

* keycloak: X.509 authentication: CRL signatures are not verified
(CVE-2019-3875)

* undertow: leak credentials to log files
UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)

* bootstrap: XSS in the tooltip or popover data-template attribute
(CVE-2019-8331)

* keycloak: Node.js adapter internal NBF can be manipulated
(CVE-2019-10157)

* js-jquery: prototype pollution in object's prototype leading to denial of
service or remote code execution or property injection (CVE-2019-11358)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1601616 - CVE-2018-14041 bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy
1668082 - CVE-2018-20676 bootstrap: XSS in the tooltip data-viewport attribute
1668089 - CVE-2018-20677 bootstrap: XSS in the affix configuration target property
1668097 - CVE-2016-10735 bootstrap: XSS in the data-target attribute
1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute
1688966 - CVE-2019-3872 picketlink: reflected XSS in SAMLRequest via RelayState parameter
1689014 - CVE-2019-3873 picketlink: URL injection via xinclude parameter
1690628 - CVE-2019-3875 keycloak: missing signatures validation on CRL used to verify client certificates
1693777 - CVE-2019-3888 undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed
1701972 - CVE-2019-11358 js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection
1702953 - CVE-2019-10157 keycloak: Node.js adapter internal NBF can be manipulated leading to DoS.

5. References:

https://access.redhat.com/security/cve/CVE-2016-10735
https://access.redhat.com/security/cve/CVE-2018-14041
https://access.redhat.com/security/cve/CVE-2018-20676
https://access.redhat.com/security/cve/CVE-2018-20677
https://access.redhat.com/security/cve/CVE-2019-3872
https://access.redhat.com/security/cve/CVE-2019-3873
https://access.redhat.com/security/cve/CVE-2019-3875
https://access.redhat.com/security/cve/CVE-2019-3888
https://access.redhat.com/security/cve/CVE-2019-8331
https://access.redhat.com/security/cve/CVE-2019-10157
https://access.redhat.com/security/cve/CVE-2019-11358
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso&downloadType=securityPatches&version=7.3
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXP/Js9zjgjWX9erEAQhq+xAAhN99EmwW27VDe/PAp8jM6sL8bSiqIVTf
FfrjFhnreCeQHRHm9ySzj5XJD3U8HhFs/RkNf7lacfAV+LZ4TJffNBdaUJAezcXQ
5Xa8BakQ8mkC2bmZydujtaRuu78iOydmitAU1dTCifWreUHi8HKubio8Uk7hW7jJ
7VijR2ItqBestpz5KqOLlvuAzh+K47wft7oI/ga+rMxeIA5N971fkLlqK8pkovVJ
N23fyRzobPdCzhPyCunRD3LFee2/GLZz0uxYX1OwG3f3JPpNjjhhQ7Fb4UN/9dMC
KycaylIfdZIYTgehBe5jQVU0t/WMFw05EvkNP0IqQDCUplVEHa0HlaJXqmFE1KOy
eug573jEBW5NLBfqihNy2XDjuktp540KTec3t67DsnNelr2NC28fVHi0XTZxyCwg
QpzPyl5i9kOui3fqGCTxBO28RMSJGQU1cI7wyNWfHZ63v3kzscdvXwvXY9asWK9M
N2SpKMRlb0190lRlU4XYqGeaFHO/FtYiLrieujV/1hhyoyzT9ocuKfcKv/yKJZ5o
XoAPINBcfhk932o39EDJk5UA/h0p5mKMN2hDJHGC3HCsle5uqAmCj0m+1PXQQhTd
Df2yZpcIeNad6et7UlwY3sAhFWJQ1VN9ME8BIphKu5CqInAZtZKrYGByvOdqVbX7
8QsAY6H6R80=
=rceQ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXQBO5WaOgq3Tt24GAQjQvg//ZlsEfv0rZWRdByQY2weWcxGDpnYys2GO
p9jY5TT9LIDhpSc4Ez+A4/cK0D+yB9lKec6+eLupsk1o1rXTllXpMzkJgHqGJ3G0
liHqLW5z/sM4EGsyZD7kJIadbwF6DRPzL108Mh4FIaL1gvHXG8NScSuiVjPnjYVB
xcmeE8/JaR/L1nKZT3EmGmstIPZPMorLqcX2iG6hdw06HIhYKWVRWqfGdUpA4ol9
F5wkTe3j7f7VTCp7AVdH+dzK7So3m2ilhYIw75w6UoHwBXdnPSdiV9ahMOuet0iq
se104F9JrDKpa8JlNu48onSO2tdvOQewB9ZwFBE6X59gOkWkmHSI1hplsKHki7yM
CLdZiZrQjMmLj0gxnnLYRCx/B6X4WIe70W0D99Z5oEMjRmngpCcRwC8+JhBykgaQ
93HzCiCoDH3ZnMeEYSnFIl0ArDudW9YyHpBN35VE0gyyx4bDFXtA+uHAaaad7imz
6QCi1Eeu+Rf4EPRletTdK1pE8KusMLY5kiqjjZh9xzO3/0BsqYeoh76+udKX9qDX
hRDjSMg7rqU3Isz0Vw+4ic1nsWArIgqrBOo9om1GpbvrOEkW68n9fUPBz3H+AUIC
bBapEIPRTpCdo/wUsIu6jJo17S359SyWh40wVdx+i5LI583D2tFSE6Fw07s3uidN
eY+kYtDaNow=
=Kmty
-----END PGP SIGNATURE-----