First published: Tue Aug 18 2020(Updated: )
Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.<br>This release of Red Hat Single Sign-On 7.4.2 serves as a replacement for Red Hat Single Sign-On 7.4.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> EAP: field-name is not parsed in accordance to RFC7230 (CVE-2020-1710)</li> <li> jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)</li> <li> jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)</li> <li> wildfly: unsafe deserialization in Wildfly Enterprise Java Beans (CVE-2020-10740)</li> <li> keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body (CVE-2020-10758)</li> <li> Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain (CVE-2020-1748)</li> <li> dom4j: XML External Entity vulnerability in default SAX parser (CVE-2020-10683)</li> <li> Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests (CVE-2020-10687)</li> <li> hibernate-validator: Improper input validation in the interpolation of constraint error messages (CVE-2020-10693)</li> <li> wildfly-elytron: session fixation when using FORM authentication (CVE-2020-10714)</li> <li> wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API (CVE-2020-10718)</li> <li> wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service (CVE-2020-14307)</li> <li> netty: compression/decompression codecs don't enforce limits on buffer allocation sizes (CVE-2020-11612)</li> <li> keycloak: security headers missing on REST endpoints (CVE-2020-1728)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.