First published: Thu Mar 14 2019(Updated: )
It was found that a SAMLRequest containing a script could be processed by Picketlink versions shipped in Jboss Application Platform 7.2.x and 7.1.x. An attacker could use this to send a malicious script to achieve cross-site scripting and obtain unauthorized information or conduct further attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =7.2.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Single Sign-On | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3872 is considered a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2019-3872, upgrade to a patched version of Red Hat JBoss Enterprise Application Platform 7.2.x or 7.1.x.
CVE-2019-3872 affects Red Hat JBoss Enterprise Application Platform versions 7.2.0 and 7.1.x.
CVE-2019-3872 utilizes cross-site scripting through a malicious SAMLRequest.
An attacker leveraging CVE-2019-3872 could obtain unauthorized information and potentially conduct further attacks.