First published: Tue May 12 2020(Updated: )
Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.<br>This asynchronous patch is a security update for the Undertow package in Red Hat Single Sign-On 7.3.8. <br>Security Fix(es):<br><li> infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)</li> <li> mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter (CVE-2018-14371)</li> <li> Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 (CVE-2020-6950)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Single Sign On |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2113 is considered critical due to vulnerabilities found in the Undertow package.
To fix RHSA-2020:2113, users should apply the security update to the Undertow package as recommended by Red Hat.
RHSA-2020:2113 affects Red Hat Single Sign-On 7.3 and its associated components.
The RHSA-2020:2113 vulnerability primarily involves the Undertow package utilized within Red Hat Single Sign-On.
There are no documented workarounds for RHSA-2020:2113; applying the security update is the recommended action.