SB2019050926 - Multiple vulnerabilities in Red Hat Single Sign-On 7.3
Published: May 9, 2019 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Deserialization of Untrusted Data (CVE-ID: CVE-2018-11307)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the usage of default typing along with a gadget class from iBatis, which allows exfiltration of content. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Deserialization of Untrusted Data (CVE-ID: CVE-2018-12022)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists when Default Typing is enabled and the service has the Jodd-db jar in the classpath. A remote attacker can provide an LDAP service to access and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Deserialization of Untrusted Data (CVE-ID: CVE-2018-12023)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists when Default Typing is enabled and the service has the Oracle JDBC jar in the classpath. A remote attacker can provide an LDAP service to access and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Information disclosure (CVE-ID: CVE-2018-14642)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to incorrect processing of HTTP response headers during buffer flushing. A remote attacker can view contents of HTTP responses from previous requests.
5) XXE attack (CVE-ID: CVE-2018-14720)
The disclosed vulnerability allows a remote attacker to perform XXE attacks.
The vulnerability exists due to fail to block unspecified Java Development Kit (JDK) classes from polymorphic deserialization. A remote attacker can send a specially crafted request that submits malicious input, conduct an XXE attack to access sensitive information, bypass security restrictions, or cause a denial of service (DoS) condition on the targeted system.
6) Improper input validation (CVE-ID: CVE-2018-14721)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the NoSQL (jackson-databind) component in Oracle NoSQL Database. A remote non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
7) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2018-14721)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to fail to block the axis2-jaxws class from polymorphic deserialization. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-3805)
The vulnerability allows a local user to perform denial of service attack.
The vulnerability exists due to insecure permissions for /var/run/jboss-eap/ file that allows any user with permissions to run init.d scripts to terminate arbitrary process by modifying its PID in /var/run/jboss-eap/.
9) Insufficiently protected credentials (CVE-ID: CVE-2019-3868)
The vulnerability allows a remote attacker to hijack user's session.
The vulnerability exists due to software may use the end user token (access or id token JWT) as a session cookie for browser sessions for OIDC. A remote attacker that has access to the service provider backend can hijack the user's browser session and gain unauthorized access to the application.
10) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-3894)
The vulnerability allows a remote authenticated user to execute arbitrary code.
It was discovered that the ElytronManagedThread in Wildfly's Elytron subsystem in versions from 11 to 16 stores a SecurityIdentity to run the thread as. These threads do not necessarily terminate if the keep alive time has not expired. This could allow a shared thread to use the wrong security identity when executing.
Remediation
Install update from vendor's website.