SB2024061978 - Multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9 



SB2024061978 - Multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9

Published: June 19, 2024

Security Bulletin ID SB2024061978
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2024-1102)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files, such as database connection credentials. A local user can read the log files and gain access to sensitive data.


2) Improper access control (CVE-ID: CVE-2023-4503)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to custom provisioning of eap-galleon creates unsecured http-invoker, when using Galleon to provision custom EAP or EAP-XP servers. A remote attacker can bypass implemented security restrictions and access remote HTTP services available from the server.


3) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2024-1233)

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input within the JwtValidator.resolvePublicKey. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.


4) Improper Authorization (CVE-ID: CVE-2023-6236)

The vulnerability allows a remote user to bypass certain security restrictions.

The vulnerability exists in the OidcSessionTokenStore when determining if a cached token should be used or not. When an OIDC app that serves multiple tenants attempts to access the second tenant, it should prompt the user to log in again since the second tenant is secured with a different OIDC configuration. A remote user can gain unauthorized access to the second tenant.


Remediation

Install update from vendor's website.