Lucene search

K
redhatRedHatRHSA-2024:0799
HistoryFeb 13, 2024 - 4:48 p.m.

(RHSA-2024:0799) Important: Red Hat Single Sign-On 7.6.7 security update on RHEL 8

2024-02-1316:48:55
access.redhat.com
15
red hat single sign-on 7.6.7
rhel 8
bug fixes
enhancements
keycloak project
authentication
single sign-on
security update
cve-2023-6291
cve-2023-2976
cve-2023-26048
cve-2023-26049
cve-2023-6134
cve-2023-6927
cve-2023-44483
cvss score

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

7

Confidence

High

EPSS

0.002

Percentile

62.2%

Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.6.7 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

Security Fix(es):

  • redirect_uri validation logic that allows for a bypass of otherwise explicitly allowed hosts (CVE-2023-6291)
  • guava: insecure temporary directory creation (CVE-2023-2976)
  • jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() (CVE-2023-26048)
  • jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies (CVE-2023-26049)
  • reflected XSS via wildcard in OIDC redirect_uri (CVE-2023-6134)
  • open redirect via “form_post.jwt” JARM response mode (CVE-2023-6927)
  • santuario: Private Key disclosure in debug-log output (CVE-2023-44483)
  • Log Injection during WebAuthn authentication or registration (CVE-2023-6484)3-44483)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

7

Confidence

High

EPSS

0.002

Percentile

62.2%