RHEL 6 : Red Hat Single Sign-On 7.1 update on RHEL 6 (Moderate) (RHSA-2017:0872)

medium Nessus Plugin ID 117313

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2017:0872 advisory.

Red Hat Single Sign-On is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.1 serves as a replacement for Red Hat Single Sign-On 7.0, and includes several bug fixes and enhancements. For further information regarding those, refer to the Release Notes linked to in the References section.

Security Fix(es):

* It was found that keycloak did not correctly check permissions when handling service account user deletion requests sent to the REST server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm. (CVE-2016-8629)

* It was found that JBoss EAP 7 Header Cache was inefficient. An attacker could use this flaw to cause a denial of service attack. (CVE-2016-9589)

* It was found that keycloak's implementation of HMAC verification for JWS tokens uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks. (CVE-2017-2585)

Red Hat would like to thank Gabriel Lavoie (Halogen Software) for reporting CVE-2016-9589 and Richard Kettelerij (Mindloops) for reporting CVE-2017-2585.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?813f1fff

http://www.nessus.org/u?b0187894

https://access.redhat.com/errata/RHSA-2017:0872

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1388988

https://bugzilla.redhat.com/show_bug.cgi?id=1404782

https://bugzilla.redhat.com/show_bug.cgi?id=1412376

https://issues.redhat.com/browse/RHSSO-427

Plugin Details

Severity: Medium

ID: 117313

File Name: redhat-RHSA-2017-0872.nasl

Version: 1.8

Type: local

Agent: unix

Published: 9/6/2018

Updated: 11/4/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P

CVSS Score Source: CVE-2016-8629

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:rh-sso7-zxing, p-cpe:/a:redhat:enterprise_linux:rh-sso7-javapackages-tools, p-cpe:/a:redhat:enterprise_linux:rh-sso7-twitter4j-core, p-cpe:/a:redhat:enterprise_linux:rh-sso7-keycloak-server, p-cpe:/a:redhat:enterprise_linux:rh-sso7-python-javapackages, p-cpe:/a:redhat:enterprise_linux:rh-sso7-liquibase-core, p-cpe:/a:redhat:enterprise_linux:rh-sso7-zxing-javase, p-cpe:/a:redhat:enterprise_linux:rh-sso7-liquibase, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:rh-sso7-zxing-core, p-cpe:/a:redhat:enterprise_linux:rh-sso7-twitter4j, p-cpe:/a:redhat:enterprise_linux:rh-sso7-libunix-dbus-java, p-cpe:/a:redhat:enterprise_linux:rh-sso7, p-cpe:/a:redhat:enterprise_linux:rh-sso7-keycloak, p-cpe:/a:redhat:enterprise_linux:rh-sso7-libunix-dbus-java-devel, p-cpe:/a:redhat:enterprise_linux:rh-sso7-freemarker, p-cpe:/a:redhat:enterprise_linux:rh-sso7-runtime

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 4/4/2017

Vulnerability Publication Date: 3/12/2018

Reference Information

CVE: CVE-2016-8629, CVE-2016-9589, CVE-2017-2585

CWE: 284, 385, 400

RHSA: 2017:0872