First published: Mon Jun 01 2020(Updated: )
Red Hat support for Spring Boot provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.<br>This release of Red Hat support for Spring Boot 2.2.6 serves as a replacement for Red Hat support for Spring Boot 2.1.13, and includes security and bug fixes and enhancements. For further information, refer to the release notes linked to in the References section.<br>Security Fix(es):<br><li> keycloak: security issue on reset credential flow (CVE-2020-1718)</li> <li> keycloak: stored XSS in client settings via application links (CVE-2020-1697)</li> <li> keycloak: missing input validation in IDP authorization URLs (CVE-2020-1727)</li> <li> keycloak: Password leak by logged exception in HttpMethod class (CVE-2020-1698)</li> <li> keycloak: problem with privacy after user logout (CVE-2020-1724)</li> <li> keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP (CVE-2020-1744)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2252 is classified as important.
To fix the vulnerabilities in RHSA-2020:2252, you should update your Red Hat Spring Boot package to version 2.2.6 or later.
RHSA-2020:2252 addresses multiple vulnerabilities related to security flaws in Spring Boot.
The recommended upgrade path for RHSA-2020:2252 is to upgrade to the latest supported version of Spring Boot provided by Red Hat.
RHSA-2020:2252 was released on December 4, 2020.