RHEL 9:Red Hat JBoss Enterprise Application Platform 8.0.4 安全更新(重要)(RHSA-2024:8824)

high Nessus 插件 ID 210414

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 9 主机上安装的程序包受到 RHSA-2024:8824 公告中提及的多个漏洞影响。

Red Hat JBoss Enterprise Application Platform 8 是基于 WildFly 应用程序运行时的 Java 应用程序平台。此 Red Hat JBoss Enterprise Application Platform 8.0.4 版本可替换 Red Hat JBoss Enterprise Application Platform 8.0.3,并包含缺陷修复和多项增强。请参阅 Red Hat JBoss Enterprise Application Platform 8.0.4 版本说明以获取有关此版本最重要的缺陷修复和增强功能信息。

安全修复:

* org.apache.cxf/cxf-rt-transports-http: CXF HTTP 客户端中未限制的内存消耗 [eap-8.0.z] (CVE-2024-41172)

* com.nimbusds/nimbus-jose-jwt:较大的 JWE p2c 标头值造成拒绝服务 [eap-8.0.z] (CVE-2023-52428)

* wildfly-domain-http:wildfly:无 EAP 管理接口超时可导致拒绝服务 (DoS) [eap-8.0.z] (CVE-2024-4029)

* xalan:OpenJDK:Xalan-J 中存在整数截断问题 (JAXP、8285407) [eap-8.0.z] (CVE-2022-34169)

* org.keycloak/keycloak-services:Open Redirec 中出现重定向 URI 验证结果漏洞 [eap-8.0.z] (CVE-2024-8883)

* org.keycloak/keycloak-saml-core-public:SAML 响应的不当验证导致 Keycloak 中权限升级 [eap-8.0.z] (CVE-2024-8698)

* org.keycloak/keycloak-saml-core:SAML 响应的不当验证导致 Keycloak 中权限升级 [eap-8.0.z] (CVE-2024-8698)

有关上述安全问题的更多详细信息,包括其影响、CVSS 得分、致谢,以及其他相关信息,请参阅列于“参考”部分的 CVE 页面。

Tenable 已直接从 Red Hat Enterprise Linux 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://access.redhat.com/security/updates/classification/#important

http://www.nessus.org/u?919aa761

https://bugzilla.redhat.com/show_bug.cgi?id=2108554

https://bugzilla.redhat.com/show_bug.cgi?id=2278615

https://bugzilla.redhat.com/show_bug.cgi?id=2298829

https://bugzilla.redhat.com/show_bug.cgi?id=2309764

https://bugzilla.redhat.com/show_bug.cgi?id=2311641

https://bugzilla.redhat.com/show_bug.cgi?id=2312511

https://issues.redhat.com/browse/JBEAP-24945

https://issues.redhat.com/browse/JBEAP-25035

https://issues.redhat.com/browse/JBEAP-27002

https://issues.redhat.com/browse/JBEAP-27194

https://issues.redhat.com/browse/JBEAP-27248

https://issues.redhat.com/browse/JBEAP-27276

https://issues.redhat.com/browse/JBEAP-27293

https://issues.redhat.com/browse/JBEAP-27392

https://issues.redhat.com/browse/JBEAP-27543

https://issues.redhat.com/browse/JBEAP-27585

https://issues.redhat.com/browse/JBEAP-27643

https://issues.redhat.com/browse/JBEAP-27659

https://issues.redhat.com/browse/JBEAP-27688

https://issues.redhat.com/browse/JBEAP-27694

https://issues.redhat.com/browse/JBEAP-27957

https://issues.redhat.com/browse/JBEAP-28057

https://issues.redhat.com/browse/JBEAP-28278

https://issues.redhat.com/browse/JBEAP-28289

http://www.nessus.org/u?b771b336

https://access.redhat.com/errata/RHSA-2024:8824

插件详情

严重性: High

ID: 210414

文件名: redhat-RHSA-2024-8824.nasl

版本: 1.2

类型: local

代理: unix

发布时间: 2024/11/6

最近更新时间: 2024/12/16

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.6

Vendor

Vendor Severity: Important

CVSS v2

风险因素: High

基本分数: 7.8

时间分数: 6.1

矢量: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N

CVSS 分数来源: CVE-2022-34169

CVSS v3

风险因素: High

基本分数: 7.5

时间分数: 6.7

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

时间矢量: CVSS:3.0/E:P/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-tools, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-jakarta-service-extensions, p-cpe:/a:redhat:enterprise_linux:eap8-narayana-jbossxts, p-cpe:/a:redhat:enterprise_linux:eap8-asyncutil, p-cpe:/a:redhat:enterprise_linux:eap8-hibernate, p-cpe:/a:redhat:enterprise_linux:eap8-nimbus-jose-jwt, p-cpe:/a:redhat:enterprise_linux:eap8-saaj-impl, p-cpe:/a:redhat:enterprise_linux:eap8-narayana, p-cpe:/a:redhat:enterprise_linux:eap8-apache-commons-lang, p-cpe:/a:redhat:enterprise_linux:eap8-wildfly-java-jdk11, p-cpe:/a:redhat:enterprise_linux:eap8-aesh-extensions, p-cpe:/a:redhat:enterprise_linux:eap8-jboss-logging, p-cpe:/a:redhat:enterprise_linux:eap8-shibboleth-java-support, p-cpe:/a:redhat:enterprise_linux:eap8-narayana-restat-integration, p-cpe:/a:redhat:enterprise_linux:eap8-wildfly-modules, p-cpe:/a:redhat:enterprise_linux:eap8-aws-java-sdk-kms, p-cpe:/a:redhat:enterprise_linux:eap8-objectweb-asm, p-cpe:/a:redhat:enterprise_linux:eap8-jctools-core, p-cpe:/a:redhat:enterprise_linux:eap8-resteasy-spring, p-cpe:/a:redhat:enterprise_linux:eap8-resteasy-extensions, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf, p-cpe:/a:redhat:enterprise_linux:eap8-hppc, p-cpe:/a:redhat:enterprise_linux:eap8-aws-java-sdk-core, p-cpe:/a:redhat:enterprise_linux:eap8-aesh-readline, p-cpe:/a:redhat:enterprise_linux:eap8-apache-commons-collections, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-jakarta-client, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-native, p-cpe:/a:redhat:enterprise_linux:eap8-artemis-wildfly-integration, p-cpe:/a:redhat:enterprise_linux:eap8-jmespath-java, p-cpe:/a:redhat:enterprise_linux:eap8-log4j, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-server, p-cpe:/a:redhat:enterprise_linux:eap8-jakarta-servlet-jsp-jstl-api, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-core-client, p-cpe:/a:redhat:enterprise_linux:eap8-narayana-restat-api, p-cpe:/a:redhat:enterprise_linux:eap8-apache-commons-io, p-cpe:/a:redhat:enterprise_linux:eap8-eap-product-conf-parent, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis, p-cpe:/a:redhat:enterprise_linux:eap8-wildfly-java-jdk17, p-cpe:/a:redhat:enterprise_linux:eap8-slf4j-api, p-cpe:/a:redhat:enterprise_linux:eap8-artemis-native, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-hqclient-protocol, p-cpe:/a:redhat:enterprise_linux:eap8-artemis-native-wildfly, p-cpe:/a:redhat:enterprise_linux:eap8-narayana-restat-util, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-commons, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-hornetq-protocol, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-jakarta-server, p-cpe:/a:redhat:enterprise_linux:eap8-fastinfoset, p-cpe:/a:redhat:enterprise_linux:eap8-hibernate-validator-cdi, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-services, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:eap8-cryptacular, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-rt, p-cpe:/a:redhat:enterprise_linux:eap8-eap-product-conf-wildfly-ee-feature-pack, p-cpe:/a:redhat:enterprise_linux:eap8-aws-java-sdk-s3, p-cpe:/a:redhat:enterprise_linux:eap8-wildfly, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-selector, p-cpe:/a:redhat:enterprise_linux:eap8-jgroups, p-cpe:/a:redhat:enterprise_linux:eap8-aws-java-sdk, p-cpe:/a:redhat:enterprise_linux:eap8-snakeyaml, p-cpe:/a:redhat:enterprise_linux:eap8-hibernate-envers, p-cpe:/a:redhat:enterprise_linux:eap8-pem-keystore, p-cpe:/a:redhat:enterprise_linux:eap8-narayana-jts-integration, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-jakarta-ra, p-cpe:/a:redhat:enterprise_linux:eap8-narayana-jbosstxbridge, p-cpe:/a:redhat:enterprise_linux:eap8-hibernate-validator, p-cpe:/a:redhat:enterprise_linux:eap8-jakarta-servlet-jsp-jstl, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-jdbc-store, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-cli, p-cpe:/a:redhat:enterprise_linux:eap8-resteasy-tracing-api, p-cpe:/a:redhat:enterprise_linux:eap8-objectweb-asm-util, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-dto, p-cpe:/a:redhat:enterprise_linux:eap8-jboss-cert-helper, p-cpe:/a:redhat:enterprise_linux:eap8-insights-java-client, p-cpe:/a:redhat:enterprise_linux:eap8-narayana-jts-idlj, p-cpe:/a:redhat:enterprise_linux:eap8-narayana-restat-bridge, p-cpe:/a:redhat:enterprise_linux:eap8-wildfly-java-jdk21, p-cpe:/a:redhat:enterprise_linux:eap8-jctools, p-cpe:/a:redhat:enterprise_linux:eap8-slf4j, p-cpe:/a:redhat:enterprise_linux:eap8-apache-commons-codec, p-cpe:/a:redhat:enterprise_linux:eap8-hibernate-core, p-cpe:/a:redhat:enterprise_linux:eap8-activemq-artemis-journal

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2024/11/4

漏洞发布日期: 2022/7/19

参考资料信息

CVE: CVE-2022-34169, CVE-2023-52428, CVE-2024-4029, CVE-2024-41172, CVE-2024-8698, CVE-2024-8883

CWE: 192, 347, 400, 401, 601, 770

RHSA: 2024:8824