RHEL 9 : Red Hat Single Sign-On 7.6.2 security update on RHEL 9 (Important) (RHSA-2023:1045)
Discription

The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2023:1045 advisory.

– bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)

– bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)

– jquery: Prototype pollution in object’s prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)

– jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)

– jquery: Untrusted code execution via tag in HTML passed to DOM manipulation methods (CVE-2020-11023)

– glob-parent: Regular Expression Denial of Service (CVE-2021-35065)

– minimist: prototype pollution (CVE-2021-44906)

– keycloak: HTML injection in execute-actions-email Admin REST API (CVE-2022-1274)

– keycloak: XSS on impersonation under specific circumstances (CVE-2022-1438)

– SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)

– Moment.js: Path traversal in moment.locale (CVE-2022-24785)

– snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)

– Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations (CVE-2022-2764)

– moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)

– loader-utils:Regular expression denial of service (CVE-2022-37603)

– keycloak: path traversal via double URL encoding (CVE-2022-3782)

– snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode (CVE-2022-38749)

– snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (CVE-2022-38750)

– snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match (CVE-2022-38751)

– keycloak: Session takeover with OIDC offline refreshtokens (CVE-2022-3916)

– jettison: parser crash by stackoverflow (CVE-2022-40149)

– jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)

– keycloak: reflected XSS attack (CVE-2022-4137)

– jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)

– jackson-databind: use of deeply nested arrays (CVE-2022-42004)

– mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)

– jettison: If the value in map is the map’s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)

– json5: Prototype Pollution in JSON5 via Parse Method (CVE-2022-46175)

– Apache CXF: directory listing / code exfiltration (CVE-2022-46363)

– Apache CXF: SSRF Vulnerability (CVE-2022-46364)

– keycloak: Client Registration endpoint does not check token revocation (CVE-2023-0091)

– keycloak: user impersonation via stolen uuid code (CVE-2023-0264)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.Read More

Back to Main

Subscribe for the latest news: