SB2019121847 - Multiple vulnerabilities in RSA Identity Governance and Lifecycle



SB2019121847 - Multiple vulnerabilities in RSA Identity Governance and Lifecycle

Published: December 18, 2019 Updated: August 8, 2020

Security Bulletin ID SB2019121847
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Cross-site scripting (CVE-ID: CVE-2019-18571)

The vulnerability allows a remote authenticated user to read and manipulate data.

The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. An authenticated malicious local user could potentially exploit this vulnerability by sending crafted URL with scripts. When victim users access the module through their browsers, the malicious code gets injected and executed by the web browser in the context of the vulnerable web application.


2) Improper Authentication (CVE-ID: CVE-2019-18572)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application.


3) Session Fixation (CVE-ID: CVE-2019-18573)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim’s session and perform arbitrary actions with privileges of the user within the compromised session.


Remediation

Install update from vendor's website.