SB2021052121 - Multiple vulnerabilities in Red Hat Single Sign-On 7.4



SB2021052121 - Multiple vulnerabilities in Red Hat Single Sign-On 7.4

Published: May 21, 2021 Updated: February 11, 2025

Security Bulletin ID SB2021052121
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Spoofing attack (CVE-ID: CVE-2021-3424)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user IDN names. A remote attacker can register with an IDN name, which looks exactly like a name of previously registered user and trick the application administrator into assigning higher privileges to such account.


2) Insufficient Session Expiration (CVE-ID: CVE-2021-3461)

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to the way Keycloak handles backchannel logout requests. If the logout request comes from an external SAML identity provider and Principal Type is set to Attribute [Name], the application ignores such request.


3) Cleartext storage of sensitive information (CVE-ID: CVE-2021-21290)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to insecure usage of temporary files in AbstractDiskHttpData method in Netty. The application stores sensitive information in temporary file that has insecure permissions. A local user can view application's temporary file and gain access to potentially sensitive data.

4) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2021-21295)

The vulnerability allows a remote attacker to preform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests in io.netty:netty-codec-http2 when converting HTTP/2 to HTTP/1 streams. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


Remediation

Install update from vendor's website.