First published: Thu Jan 12 2023(Updated: )
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.<br>This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.<br>Security Fix(es):<br><li> CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-apache-cxf | <3.4.10-1.redhat_00001.1.el9ea | 3.4.10-1.redhat_00001.1.el9ea |
redhat/eap7-wss4j | <2.3.3-1.redhat_00001.1.el9ea | 2.3.3-1.redhat_00001.1.el9ea |
redhat/eap7-xml-security | <2.2.3-1.redhat_00001.1.el9ea | 2.2.3-1.redhat_00001.1.el9ea |
redhat/eap7-apache-cxf-rt | <3.4.10-1.redhat_00001.1.el9ea | 3.4.10-1.redhat_00001.1.el9ea |
redhat/eap7-apache-cxf-services | <3.4.10-1.redhat_00001.1.el9ea | 3.4.10-1.redhat_00001.1.el9ea |
redhat/eap7-apache-cxf-tools | <3.4.10-1.redhat_00001.1.el9ea | 3.4.10-1.redhat_00001.1.el9ea |
redhat/eap7-wss4j-bindings | <2.3.3-1.redhat_00001.1.el9ea | 2.3.3-1.redhat_00001.1.el9ea |
redhat/eap7-wss4j-policy | <2.3.3-1.redhat_00001.1.el9ea | 2.3.3-1.redhat_00001.1.el9ea |
redhat/eap7-wss4j-ws-security-common | <2.3.3-1.redhat_00001.1.el9ea | 2.3.3-1.redhat_00001.1.el9ea |
redhat/eap7-wss4j-ws-security-dom | <2.3.3-1.redhat_00001.1.el9ea | 2.3.3-1.redhat_00001.1.el9ea |
redhat/eap7-wss4j-ws-security-policy-stax | <2.3.3-1.redhat_00001.1.el9ea | 2.3.3-1.redhat_00001.1.el9ea |
redhat/eap7-wss4j-ws-security-stax | <2.3.3-1.redhat_00001.1.el9ea | 2.3.3-1.redhat_00001.1.el9ea |
redhat/eap7-apache-cxf | <3.4.10-1.redhat_00001.1.el8ea | 3.4.10-1.redhat_00001.1.el8ea |
redhat/eap7-wss4j | <2.3.3-1.redhat_00001.1.el8ea | 2.3.3-1.redhat_00001.1.el8ea |
redhat/eap7-xml-security | <2.2.3-1.redhat_00001.1.el8ea | 2.2.3-1.redhat_00001.1.el8ea |
redhat/eap7-apache-cxf-rt | <3.4.10-1.redhat_00001.1.el8ea | 3.4.10-1.redhat_00001.1.el8ea |
redhat/eap7-apache-cxf-services | <3.4.10-1.redhat_00001.1.el8ea | 3.4.10-1.redhat_00001.1.el8ea |
redhat/eap7-apache-cxf-tools | <3.4.10-1.redhat_00001.1.el8ea | 3.4.10-1.redhat_00001.1.el8ea |
redhat/eap7-wss4j-bindings | <2.3.3-1.redhat_00001.1.el8ea | 2.3.3-1.redhat_00001.1.el8ea |
redhat/eap7-wss4j-policy | <2.3.3-1.redhat_00001.1.el8ea | 2.3.3-1.redhat_00001.1.el8ea |
redhat/eap7-wss4j-ws-security-common | <2.3.3-1.redhat_00001.1.el8ea | 2.3.3-1.redhat_00001.1.el8ea |
redhat/eap7-wss4j-ws-security-dom | <2.3.3-1.redhat_00001.1.el8ea | 2.3.3-1.redhat_00001.1.el8ea |
redhat/eap7-wss4j-ws-security-policy-stax | <2.3.3-1.redhat_00001.1.el8ea | 2.3.3-1.redhat_00001.1.el8ea |
redhat/eap7-wss4j-ws-security-stax | <2.3.3-1.redhat_00001.1.el8ea | 2.3.3-1.redhat_00001.1.el8ea |
redhat/eap7-apache-cxf | <3.4.10-1.redhat_00001.1.el7ea | 3.4.10-1.redhat_00001.1.el7ea |
redhat/eap7-wss4j | <2.3.3-1.redhat_00001.1.el7ea | 2.3.3-1.redhat_00001.1.el7ea |
redhat/eap7-xml-security | <2.2.3-1.redhat_00001.1.el7ea | 2.2.3-1.redhat_00001.1.el7ea |
redhat/eap7-apache-cxf-rt | <3.4.10-1.redhat_00001.1.el7ea | 3.4.10-1.redhat_00001.1.el7ea |
redhat/eap7-apache-cxf-services | <3.4.10-1.redhat_00001.1.el7ea | 3.4.10-1.redhat_00001.1.el7ea |
redhat/eap7-apache-cxf-tools | <3.4.10-1.redhat_00001.1.el7ea | 3.4.10-1.redhat_00001.1.el7ea |
redhat/eap7-wss4j-bindings | <2.3.3-1.redhat_00001.1.el7ea | 2.3.3-1.redhat_00001.1.el7ea |
redhat/eap7-wss4j-policy | <2.3.3-1.redhat_00001.1.el7ea | 2.3.3-1.redhat_00001.1.el7ea |
redhat/eap7-wss4j-ws-security-common | <2.3.3-1.redhat_00001.1.el7ea | 2.3.3-1.redhat_00001.1.el7ea |
redhat/eap7-wss4j-ws-security-dom | <2.3.3-1.redhat_00001.1.el7ea | 2.3.3-1.redhat_00001.1.el7ea |
redhat/eap7-wss4j-ws-security-policy-stax | <2.3.3-1.redhat_00001.1.el7ea | 2.3.3-1.redhat_00001.1.el7ea |
redhat/eap7-wss4j-ws-security-stax | <2.3.3-1.redhat_00001.1.el7ea | 2.3.3-1.redhat_00001.1.el7ea |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:0163 addresses a Server-Side Request Forgery (SSRF) vulnerability in Apache CXF.
To remediate RHSA-2023:0163, update the affected packages to the specified versions provided in the advisory.
The severity level of RHSA-2023:0163 is classified as important.
RHSA-2023:0163 affects several packages including eap7-apache-cxf, eap7-wss4j, and eap7-xml-security among others.
Yes, the fix for RHSA-2023:0163 requires updating to specific versions including 3.4.10-1.redhat_00001.1.el9ea for certain packages.