-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2613
               AMQ Online 1.5.2 release and security update
                               31 July 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat JBoss AMQ
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Cross-site Request Forgery -- Remote with User Interaction
                   Denial of Service          -- Remote/Unauthenticated      
                   Access Confidential Data   -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-14319 CVE-2020-13692 

Reference:         ESB-2020.2576
                   ESB-2020.2467

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:3209

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: AMQ Online 1.5.2 release and security update
Advisory ID:       RHSA-2020:3209-01
Product:           Red Hat JBoss AMQ
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:3209
Issue date:        2020-07-29
Cross references:  RHBA-2020:57503-01
CVE Names:         CVE-2020-13692 CVE-2020-14319 
=====================================================================

1. Summary:

An update of the Red Hat OpenShift Container Platform 3.11 and 4.4/4.5
container images is now available for Red Hat AMQ Online.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

The release of Red Hat AMQ Online 1.5.2 serves as a replacement for AMQ
Online 1.5.1, and includes bug fixes and enhancements, which are documented
in the Release Notes document linked in the References.

Security Fix(es):

* AMQ Online: CSRF in graphQL requests (CVE-2020-14319)

* postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
(CVE-2020-13692)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

The Red Hat OpenShift Container Platform 3.11 and 4.4/4.5 container images
provided by this update can be downloaded from the Red Hat Container
Registry at registry.access.redhat.com. Installation instructions for your
platform are available from https://access.redhat.com.

Dockerfiles and scripts should be amended either to refer to this new image
specifically, or to the latest image generally.

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

4. Bugs fixed (https://bugzilla.redhat.com/):

1852985 - CVE-2020-13692 postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
1854373 - CVE-2020-14319 amq-on: CSRF (in graphQL requests)

5. References:

https://access.redhat.com/security/cve/CVE-2020-13692
https://access.redhat.com/security/cve/CVE-2020-14319
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=
distributions&product=jboss.amq.online&version=1.5.2
https://access.redhat.com/documentation/en-us/red_hat_amq/7.7/html/
release_notes_for_amq_online_1.5_on_openshift/index

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=bs2Z
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=8gwO
-----END PGP SIGNATURE-----