First published: Thu Mar 14 2019(Updated: )
It was found that Picketlink as shipped with Jboss Enterprise Application Platform 7.2 would accept an xinclude parameter in SAMLresponse XML. An attacker could use this flaw to send a URL to achieve cross-site scripting or possibly conduct further attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | =7.2.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Single Sign-On | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3873 is classified with a moderate severity level due to the potential for cross-site scripting exploits.
To fix CVE-2019-3873, update the JBoss Enterprise Application Platform to the latest patched version.
CVE-2019-3873 affects JBoss Enterprise Application Platform version 7.2.0.
CVE-2019-3873 can enable cross-site scripting attacks as well as potentially facilitate further attacks.
Yes, Red Hat Single Sign-On version 7.0 is affected by CVE-2019-3873.