RHEL 8:RHEL 8 上的 Red Hat Single Sign-On 7.6.2 安全更新(重要) (RHSA-2023: 1044)

critical Nessus 插件 ID 172042

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 8 主机上安装的程序包受到 RHSA-2023: 1044 公告中提及的漏洞的影响。

- bootstrap:重叠数据父级属性中的跨站脚本 (XSS) (CVE-2018-14040)

- bootstrap:工具提示的 data-container 属性中的跨站脚本 (XSS) (CVE-2018-14042)

- jquery:对象原型中存在原型污染,导致拒绝服务、远程代码执行或属性注入 (CVE-2019-11358)

- jquery:存在跨站脚本,这是 injQuery.htmlPrefilter 方法不当所致 (CVE-2020-11022)

- jquery:通过传递给 DOM 操纵方法的 HTML 中的 <option> 标签执行不受信任的代码 (CVE-2020-11023)

- glob-parent:正则表达式拒绝服务 (CVE-2021-35065)

- minimist:原型污染 (CVE-2021-44906)

- keycloak:execute-actions-email Admin REST API 中的 HTML 注入 (CVE-2022-1274)

- keycloak:特定情况下关于假冒的 XSS (CVE-2022-1438)

- SnakeYaml:构造函数反序列化远程代码执行 (CVE-2022-1471)

- Moment.js: moment.locale 中存在路径遍历漏洞 (CVE-2022-24785)

- snakeyaml:由于缺少集合的嵌套深度限制而导致的拒绝服务漏洞 (CVE-2022-25857)

- Undertow:可以实现 DoS,因为 Undertow 服务器会一直等待 EJB 调用的 LAST_CHUNK (CVE-2022-2764)

- moment:导致 DoS 的低效解析算法 (CVE-2022-31129)

- loader-utils:正则表达式拒绝服务 (CVE-2022-37603)

- keycloak:通过双重 URL 编码的路径遍历 (CVE-2022-3782)

- snakeyaml:org.yaml.snakeyaml.composer.Composer.composeSequenceNode 中未捕获的异常 (CVE-2022-38749)

- snakeyaml:org.yaml.snakeyaml.constructor.BaseConstructor.constructObject 中未捕获异常 (CVE-2022-38750)

- snakeyaml:java.base/java.util.regex.Pattern$Ques.match (CVE-2022-38751) 中未捕获异常

- keycloak:使用 OIDC 离线刷新标记的会话接管 (CVE-2022-3916)

- jettison: 由堆栈溢出导致的解析器崩溃 (CVE-2022-40149)

- jettison: 通过用户提供的 XML 或 JSON 数据耗尽内存 (CVE-2022-40150)

- keycloak:反射型 XSS 攻击 (CVE-2022-4137)

- jackson-databind:深层封装数组嵌套 wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)

- jackson-databind:深度嵌套数组的使用 (CVE-2022-42004)

- mina-sshd:Java 不安全反序列化漏洞 (CVE-2022-45047)

- jettison: 如果 map 中的值是 map 自身,则新的 new JSONObject(map) 会造成 StackOverflowError,进而导致 dos (CVE-2022-45693)

- json5: 通过解析方法在 JSON5 中造成原型污染 (CVE-2022-46175)

- Apache CXF:目录清单/代码泄露 (CVE-2022-46363)

- Apache CXF:SSRF 漏洞 (CVE-2022-46364)

- keycloak:客户端注册端点不检查标记吊销 (CVE-2023-0091)

- keycloak:通过被盗的 uuid 代码假冒用户 (CVE-2023-0264)

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的 rh-sso7-keycloak 和/或 rh-sso7-keycloak-server 程序包。

另见

https://access.redhat.com/security/cve/CVE-2018-14040

https://access.redhat.com/security/cve/CVE-2018-14042

https://access.redhat.com/security/cve/CVE-2019-11358

https://access.redhat.com/security/cve/CVE-2020-11022

https://access.redhat.com/security/cve/CVE-2020-11023

https://access.redhat.com/security/cve/CVE-2021-35065

https://access.redhat.com/security/cve/CVE-2021-44906

https://access.redhat.com/security/cve/CVE-2022-1274

https://access.redhat.com/security/cve/CVE-2022-1438

https://access.redhat.com/security/cve/CVE-2022-1471

https://access.redhat.com/security/cve/CVE-2022-2764

https://access.redhat.com/security/cve/CVE-2022-3782

https://access.redhat.com/security/cve/CVE-2022-3916

https://access.redhat.com/security/cve/CVE-2022-4137

https://access.redhat.com/security/cve/CVE-2022-24785

https://access.redhat.com/security/cve/CVE-2022-25857

https://access.redhat.com/security/cve/CVE-2022-31129

https://access.redhat.com/security/cve/CVE-2022-37603

https://access.redhat.com/security/cve/CVE-2022-38749

https://access.redhat.com/security/cve/CVE-2022-38750

https://access.redhat.com/security/cve/CVE-2022-38751

https://access.redhat.com/security/cve/CVE-2022-40149

https://access.redhat.com/security/cve/CVE-2022-40150

https://access.redhat.com/security/cve/CVE-2022-42003

https://access.redhat.com/security/cve/CVE-2022-42004

https://access.redhat.com/security/cve/CVE-2022-45047

https://access.redhat.com/security/cve/CVE-2022-45693

https://access.redhat.com/security/cve/CVE-2022-46175

https://access.redhat.com/security/cve/CVE-2022-46363

https://access.redhat.com/security/cve/CVE-2022-46364

https://access.redhat.com/security/cve/CVE-2023-0091

https://access.redhat.com/security/cve/CVE-2023-0264

https://access.redhat.com/errata/RHSA-2023:1044

https://bugzilla.redhat.com/1601614

https://bugzilla.redhat.com/1601617

https://bugzilla.redhat.com/1701972

https://bugzilla.redhat.com/1828406

https://bugzilla.redhat.com/1850004

https://bugzilla.redhat.com/2031904

https://bugzilla.redhat.com/2066009

https://bugzilla.redhat.com/2072009

https://bugzilla.redhat.com/2073157

https://bugzilla.redhat.com/2105075

https://bugzilla.redhat.com/2117506

https://bugzilla.redhat.com/2126789

https://bugzilla.redhat.com/2129706

https://bugzilla.redhat.com/2129707

https://bugzilla.redhat.com/2129709

https://bugzilla.redhat.com/2135244

https://bugzilla.redhat.com/2135247

https://bugzilla.redhat.com/2135770

https://bugzilla.redhat.com/2135771

https://bugzilla.redhat.com/2138971

https://bugzilla.redhat.com/2140597

https://bugzilla.redhat.com/2141404

https://bugzilla.redhat.com/2145194

https://bugzilla.redhat.com/2148496

https://bugzilla.redhat.com/2150009

https://bugzilla.redhat.com/2155681

https://bugzilla.redhat.com/2155682

https://bugzilla.redhat.com/2155970

https://bugzilla.redhat.com/2156263

https://bugzilla.redhat.com/2156324

https://bugzilla.redhat.com/2158585

https://bugzilla.redhat.com/2160585

插件详情

严重性: Critical

ID: 172042

文件名: redhat-RHSA-2023-1044.nasl

版本: 1.3

类型: local

代理: unix

发布时间: 2023/3/2

最近更新时间: 2023/8/2

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

风险信息

VPR

风险因素: High

分数: 7.4

CVSS v2

风险因素: High

基本分数: 7.5

时间分数: 6.2

矢量: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS 分数来源: CVE-2021-44906

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 9.1

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:F/RL:O/RC:C

CVSS 分数来源: CVE-2022-46364

漏洞信息

CPE: cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:rh-sso7-keycloak, p-cpe:/a:redhat:enterprise_linux:rh-sso7-keycloak-server

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2023/3/1

漏洞发布日期: 2018/7/13

参考资料信息

CVE: CVE-2018-14040, CVE-2018-14042, CVE-2019-11358, CVE-2020-11022, CVE-2020-11023, CVE-2021-35065, CVE-2021-44906, CVE-2022-1274, CVE-2022-1438, CVE-2022-1471, CVE-2022-24785, CVE-2022-25857, CVE-2022-2764, CVE-2022-31129, CVE-2022-37603, CVE-2022-3782, CVE-2022-38749, CVE-2022-38750, CVE-2022-38751, CVE-2022-3916, CVE-2022-40149, CVE-2022-40150, CVE-2022-4137, CVE-2022-42003, CVE-2022-42004, CVE-2022-45047, CVE-2022-45693, CVE-2022-46175, CVE-2022-46363, CVE-2022-46364, CVE-2023-0091, CVE-2023-0264

CWE: 1066, 121, 1321, 185, 20, 22, 303, 384, 400, 502, 787, 79, 80, 81, 918

RHSA: 2023:1044