RHEL 7:RHEL 7 上的 Red Hat JBoss Enterprise Application Platform 7.2.6 (RHSA-2020: 0160)

critical Nessus 插件 ID 133157

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 7 主机上安装的程序包受到 RHSA-2020: 0160 公告提及的漏洞的影响。

- hibernate-validator:safeHTML 验证器允许 XSS (CVE-2019-10219)

- jackson-databind:com.zaxxer.hikari.HikariConfig 中的序列化小工具 (CVE-2019-14540)

- JBoss EAP:在 CLI “重新加载”命令中显示 Vault 系统属性的安全属性值 (CVE-2019-14885)

- undertow:侦听 HTTPS 的 Undertow HTTP 服务器中可能的拒绝服务 (DOS) (CVE-2019-14888)

- jackson-databind:commons-configuration 程序包类中的序列化小工具 (CVE-2019-14892)

- jackson-databind:xalan 程序包类中的序列化小工具 (CVE-2019-14893)

- jackson-databind:com.zaxxer.hikari.HikariDataSource 中的序列化小工具 (CVE-2019-16335)

- netty:通过错误处理 HTTP 标头冒号前的空格来走私 HTTP 请求 (CVE-2019-16869)

- jackson-databind:org.apache.commons.dbcp.datasources 中的序列化小工具。* (CVE-2019-16942)

- jackson-databind:com.p6spy.engine.spy.P6DataSource 中的序列化小工具 (CVE-2019-16943)

- jackson-databind:ehcache 程序包类中的序列化小工具 (CVE-2019-17267)

- jackson-databind:org.apache.log4j.receivers.db 中的序列化小工具。* (CVE-2019-17531)

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://access.redhat.com/security/cve/CVE-2019-10219

https://access.redhat.com/security/cve/CVE-2019-14540

https://access.redhat.com/security/cve/CVE-2019-14885

https://access.redhat.com/security/cve/CVE-2019-14888

https://access.redhat.com/security/cve/CVE-2019-14892

https://access.redhat.com/security/cve/CVE-2019-14893

https://access.redhat.com/security/cve/CVE-2019-16335

https://access.redhat.com/security/cve/CVE-2019-16869

https://access.redhat.com/security/cve/CVE-2019-16942

https://access.redhat.com/security/cve/CVE-2019-16943

https://access.redhat.com/security/cve/CVE-2019-17267

https://access.redhat.com/security/cve/CVE-2019-17531

https://access.redhat.com/errata/RHSA-2020:0160

https://bugzilla.redhat.com/1738673

https://bugzilla.redhat.com/1755831

https://bugzilla.redhat.com/1755849

https://bugzilla.redhat.com/1758167

https://bugzilla.redhat.com/1758171

https://bugzilla.redhat.com/1758182

https://bugzilla.redhat.com/1758187

https://bugzilla.redhat.com/1758191

https://bugzilla.redhat.com/1758619

https://bugzilla.redhat.com/1770615

https://bugzilla.redhat.com/1772464

https://bugzilla.redhat.com/1775293

插件详情

严重性: Critical

ID: 133157

文件名: redhat-RHSA-2020-0160.nasl

版本: 1.6

类型: local

代理: unix

发布时间: 2020/1/22

最近更新时间: 2024/3/29

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.7

CVSS v2

风险因素: High

基本分数: 7.5

时间分数: 5.9

矢量: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS 分数来源: CVE-2019-17267

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 8.8

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:P/RL:O/RC:C

CVSS 分数来源: CVE-2019-17531

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:eap7-weld-core-jsf, p-cpe:/a:redhat:enterprise_linux:eap7-weld-ejb, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-databind, p-cpe:/a:redhat:enterprise_linux:eap7-jberet-core, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly12.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-wildfly8, p-cpe:/a:redhat:enterprise_linux:eap7-undertow, p-cpe:/a:redhat:enterprise_linux:eap7-undertow-jastow, p-cpe:/a:redhat:enterprise_linux:eap7-apache-cxf-rt, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-module-jaxb-annotations, p-cpe:/a:redhat:enterprise_linux:eap7-weld-core-impl, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-java-jdk11, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-java8, p-cpe:/a:redhat:enterprise_linux:eap7-netty-all, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-http-transaction-client, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-core, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-annotations, p-cpe:/a:redhat:enterprise_linux:eap7-jberet, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-eap6.4-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly10.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-http-naming-client, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-modules, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly11.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-apache-cxf, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-dataformats-binary, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-modules-java8, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly10.1-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-transaction-client, p-cpe:/a:redhat:enterprise_linux:eap7-apache-cxf-services, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-jaxrs-json-provider, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-javadocs, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-validator-cdi, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-core, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-dataformats-text, p-cpe:/a:redhat:enterprise_linux:eap7-weld-probe-core, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-http-client-common, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-http-ejb-client, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-jaxrs-base, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly9.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-weld-core, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-entitymanager, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-eap7.1-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly8.2-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-bindings, p-cpe:/a:redhat:enterprise_linux:eap7-apache-cxf-tools, p-cpe:/a:redhat:enterprise_linux:eap7-glassfish-jsf, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-datatype-jsr310, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-modules-base, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-eap7.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-weld-web, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-java-jdk8, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-envers, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-netty, p-cpe:/a:redhat:enterprise_linux:eap7-weld-jta, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly, p-cpe:/a:redhat:enterprise_linux:eap7-hal-console, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-validator, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-datatype-jdk8

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2020/1/21

漏洞发布日期: 2019/9/15

参考资料信息

CVE: CVE-2019-10219, CVE-2019-14540, CVE-2019-14885, CVE-2019-14888, CVE-2019-14892, CVE-2019-14893, CVE-2019-16335, CVE-2019-16869, CVE-2019-16942, CVE-2019-16943, CVE-2019-17267, CVE-2019-17531

CWE: 20, 200, 400, 444, 502, 532, 79

IAVA: 2020-A-0140, 2020-A-0328

RHSA: 2020:0160