Multiple vulnerabilities in Red Hat Fuse



Published: 2022-11-28 | Updated: 2022-12-14
Risk High
Patch available YES
Number of vulnerabilities 17
CVE-ID CVE-2022-24823
CVE-2022-42889
CVE-2022-41853
CVE-2022-38749
CVE-2022-33980
CVE-2022-31197
CVE-2022-31129
CVE-2022-25857
CVE-2022-24785
CVE-2019-8331
CVE-2022-24723
CVE-2022-2053
CVE-2022-2048
CVE-2022-0613
CVE-2021-44906
CVE-2021-31684
CVE-2021-3717
CWE-ID CWE-378
CWE-94
CWE-749
CWE-121
CWE-89
CWE-185
CWE-400
CWE-22
CWE-79
CWE-20
CWE-399
CWE-639
CWE-552
Exploitation vector Network
Public exploit Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #5 is available.
Vulnerable software
Subscribe
Fuse
Server applications / Application servers

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 17 vulnerabilities.

1) Creation of Temporary File With Insecure Permissions

EUVDB-ID: #VU62849

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-24823

CWE-ID: CWE-378 - Creation of Temporary File With Insecure Permissions

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to usage of insecure permissions for temporary files. A local user can view contents of temporary files and gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Code Injection

EUVDB-ID: #VU68307

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-42889

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to an insecure variable interpolation when processing untrusted input. A remote attacker can send a specially crafted input and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability was dubbed Text4shell.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Exposed dangerous method or function

EUVDB-ID: #VU69302

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-41853

CWE-ID: CWE-749 - Exposed Dangerous Method or Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to missing authorization when using java.sql.Statement or java.sql.PreparedStatement in hsqldb. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Stack-based buffer overflow

EUVDB-ID: #VU67666

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-38749

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when handling YAML files. A remote attacker can pass a specially crafted YAML file to the application, trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Code Injection

EUVDB-ID: #VU64957

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-33980

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) SQL injection

EUVDB-ID: #VU66747

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-31197

CWE-ID: CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data within the java.sql.ResultRow.refreshRow() method when processing column names. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database using the statement terminator, e.g." ;".

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

7) Incorrect Regular Expression

EUVDB-ID: #VU65835

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-31129

CWE-ID: CWE-185 - Incorrect Regular Expression

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of user-supplied input when parsing overly long strings. A remote attacker can pass a string that contains more that 10k characters and perform regular expression denial of service (ReDoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

8) Resource exhaustion

EUVDB-ID: #VU67665

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-25857

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when handling YAML files. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

9) Path traversal

EUVDB-ID: #VU62463

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-24785

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences within the npm version of Moment.js. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

10) Cross-site scripting

EUVDB-ID: #VU17694

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-8331

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

11) Input validation error

EUVDB-ID: #VU69644

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-24723

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to modify application behavior.

The vulnerability exists due to insufficient validation of user-supplied input when handling whitespace characters  in URL. A remote attacker can pass specially crafted input to the application and modify application behavior.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

12) Resource exhaustion

EUVDB-ID: #VU66672

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-2053

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can send a specially crafted AJP request, trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

13) Resource management error

EUVDB-ID: #VU65830

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-2048

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the application when handling invalid HTTP/2 requests. A remote attacker can send specially crafted requests to the server and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

14) Authorization bypass through user-controlled key

EUVDB-ID: #VU66815

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-0613

CWE-ID: CWE-639 - Authorization Bypass Through User-Controlled Key

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to the application.

The vulnerability exists due to missing access checks. A remote attacker can manipulate values in the request to gain unauthorized access to the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

15) Resource exhaustion

EUVDB-ID: #VU64030

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-44906

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

16) Improper input validation

EUVDB-ID: #VU65499

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-31684

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the E1 IOT Orchestrator (JSON Smart) component in JD Edwards EnterpriseOne Orchestrator. A remote non-authenticated attacker can exploit this vulnerability to perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

17) Files or Directories Accessible to External Parties

EUVDB-ID: #VU58178

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-3717

CWE-ID: CWE-552 - Files or Directories Accessible to External Parties

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an incorrect JBOSS_LOCAL_USER challenge location. A local unprivileged user can access any user account on the affected system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Fuse: 7.11.0


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2022:8652

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###