First published: Thu Jul 15 2021(Updated: )
These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base, so no changes to the EAP XP2 code base.<br>Security Fix(es):<br><li> velocity: arbitrary code execution when attacker is able to modify templates (CVE-2020-13936)</li> <li> bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible (CVE-2020-28052)</li> <li> bouncycastle: Timing issue within the EC math library (CVE-2020-15522)</li> <li> undertow: Possible regression in fix for CVE-2020-10687 (CVE-2021-20220)</li> <li> wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client (CVE-2021-20250)</li> <li> netty: Information disclosure via the local system temporary directory (CVE-2021-21290)</li> <li> netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)</li> <li> netty: Request smuggling via content-length header (CVE-2021-21409)</li> <li> wildfly: XSS via admin console when creating roles in domain mode (CVE-2021-3536)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform (EAP) | >=7.3.0<=7.3.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:2755 is considered critical due to the potential for arbitrary code execution.
To fix RHSA-2021:2755, you need to upgrade to the patched version provided in the advisory.
RHSA-2021:2755 addresses vulnerabilities including CVE-2020-13936, which allows arbitrary code execution through modified templates.
RHSA-2021:2755 affects specific XP2 releases that utilize the underlying EAP 7.3.x base.
Failing to address RHSA-2021:2755 could allow an attacker to execute arbitrary code on the system through compromised templates.