SB2024061978 - Multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Published: June 19, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2024-1102)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to software stores sensitive information into log files, such as database connection credentials. A local user can read the log files and gain access to sensitive data.
2) Improper access control (CVE-ID: CVE-2023-4503)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to custom provisioning of eap-galleon creates unsecured http-invoker, when using Galleon to provision custom EAP or EAP-XP servers. A remote attacker can bypass implemented security restrictions and access remote HTTP services available from the server.
3) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2024-1233)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input within the JwtValidator.resolvePublicKey. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
4) Improper Authorization (CVE-ID: CVE-2023-6236)
The vulnerability allows a remote user to bypass certain security restrictions.
The vulnerability exists in the OidcSessionTokenStore when determining if a cached token should be used or not. When an OIDC app that serves multiple tenants attempts to access the
second tenant, it should prompt the user to log in again since the
second tenant is secured with a different OIDC configuration. A remote user can gain unauthorized access to the second tenant.
Remediation
Install update from vendor's website.