RHEL 7:RHEL 7 上的 Red Hat JBoss Enterprise Application Platform 7.2.6 (RHSA-2020: 0160)

critical Nessus Plugin ID 133157

概要

遠端 Red Hat 主機缺少一個或多個安全性更新。

說明

遠端 Redhat Enterprise Linux 7 主機上安裝的套件受到 RHSA-2020: 0160 公告中提及的多個弱點影響。

- hibernate-validator:safeHTML 驗證器允許 XSS (CVE-2019-10219)

- jackson-databind:com.zaxxer.hikari.HikariConfig 中的序列化小工具 (CVE-2019-14540)

- JBoss EAP:在 CLI 'reload' 命令中洩漏 Vault 系統屬性安全性屬性值 (CVE-2019-14885)

- undertow:在接聽 HTTPS 的 Undertow HTTP 伺服器中可能發生拒絕服務 (DOS) (CVE-2019-14888)

- jackson-databind:commons-configuration 套件的類別中出現序列化小工具 (CVE-2019-14892)

- jackson-databind:xalan 套件的類別中出現序列化小工具 (CVE-2019-14893)

- jackson-databind:com.zaxxer.hikari.HikariDataSource 中的序列化小工具 (CVE-2019-16335)

- netty:未正確處理 HTTP 標頭冒號前的空格而導致 HTTP 要求走私 (CVE-2019-16869)

- jackson-databind:org.apache.commons.dbcp.datasources 中的序列化小工具。* (CVE-2019-16942)

- jackson-databind:com.p6spy.engine.spy.P6DataSource 中的序列化小工具 (CVE-2019-16943)

- jackson-databind:ehcache 套件的類別中出現序列化小工具 (CVE-2019-17267)

- jackson-databind:org.apache.log4j.receivers.db 中的序列化小工具。* (CVE-2019-17531)

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://access.redhat.com/security/cve/CVE-2019-10219

https://access.redhat.com/security/cve/CVE-2019-14540

https://access.redhat.com/security/cve/CVE-2019-14885

https://access.redhat.com/security/cve/CVE-2019-14888

https://access.redhat.com/security/cve/CVE-2019-14892

https://access.redhat.com/security/cve/CVE-2019-14893

https://access.redhat.com/security/cve/CVE-2019-16335

https://access.redhat.com/security/cve/CVE-2019-16869

https://access.redhat.com/security/cve/CVE-2019-16942

https://access.redhat.com/security/cve/CVE-2019-16943

https://access.redhat.com/security/cve/CVE-2019-17267

https://access.redhat.com/security/cve/CVE-2019-17531

https://access.redhat.com/errata/RHSA-2020:0160

https://bugzilla.redhat.com/1738673

https://bugzilla.redhat.com/1755831

https://bugzilla.redhat.com/1755849

https://bugzilla.redhat.com/1758167

https://bugzilla.redhat.com/1758171

https://bugzilla.redhat.com/1758182

https://bugzilla.redhat.com/1758187

https://bugzilla.redhat.com/1758191

https://bugzilla.redhat.com/1758619

https://bugzilla.redhat.com/1770615

https://bugzilla.redhat.com/1772464

https://bugzilla.redhat.com/1775293

Plugin 詳細資訊

嚴重性: Critical

ID: 133157

檔案名稱: redhat-RHSA-2020-0160.nasl

版本: 1.6

類型: local

代理程式: unix

已發布: 2020/1/22

已更新: 2024/3/29

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: High

基本分數: 7.5

時間分數: 5.9

媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS 評分資料來源: CVE-2019-17267

CVSS v3

風險因素: Critical

基本分數: 9.8

時間分數: 8.8

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

CVSS 評分資料來源: CVE-2019-17531

弱點資訊

CPE: p-cpe:/a:redhat:enterprise_linux:eap7-weld-core-jsf, p-cpe:/a:redhat:enterprise_linux:eap7-weld-ejb, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-databind, p-cpe:/a:redhat:enterprise_linux:eap7-jberet-core, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly12.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-wildfly8, p-cpe:/a:redhat:enterprise_linux:eap7-undertow, p-cpe:/a:redhat:enterprise_linux:eap7-undertow-jastow, p-cpe:/a:redhat:enterprise_linux:eap7-apache-cxf-rt, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-module-jaxb-annotations, p-cpe:/a:redhat:enterprise_linux:eap7-weld-core-impl, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-java-jdk11, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-java8, p-cpe:/a:redhat:enterprise_linux:eap7-netty-all, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-http-transaction-client, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-core, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-annotations, p-cpe:/a:redhat:enterprise_linux:eap7-jberet, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-eap6.4-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly10.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-http-naming-client, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-modules, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly11.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-apache-cxf, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-dataformats-binary, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-modules-java8, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly10.1-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-transaction-client, p-cpe:/a:redhat:enterprise_linux:eap7-apache-cxf-services, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-jaxrs-json-provider, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-javadocs, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-validator-cdi, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-core, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-dataformats-text, p-cpe:/a:redhat:enterprise_linux:eap7-weld-probe-core, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-http-client-common, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-http-ejb-client, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-jaxrs-base, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly9.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-weld-core, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-entitymanager, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-eap7.1-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-wildfly8.2-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-bindings, p-cpe:/a:redhat:enterprise_linux:eap7-apache-cxf-tools, p-cpe:/a:redhat:enterprise_linux:eap7-glassfish-jsf, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-datatype-jsr310, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-modules-base, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-eap7.0-to-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-weld-web, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-java-jdk8, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-envers, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-eap7.2, p-cpe:/a:redhat:enterprise_linux:eap7-netty, p-cpe:/a:redhat:enterprise_linux:eap7-weld-jta, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly, p-cpe:/a:redhat:enterprise_linux:eap7-hal-console, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-validator, p-cpe:/a:redhat:enterprise_linux:eap7-jackson-datatype-jdk8

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2020/1/21

弱點發布日期: 2019/9/15

參考資訊

CVE: CVE-2019-10219, CVE-2019-14540, CVE-2019-14885, CVE-2019-14888, CVE-2019-14892, CVE-2019-14893, CVE-2019-16335, CVE-2019-16869, CVE-2019-16942, CVE-2019-16943, CVE-2019-17267, CVE-2019-17531

CWE: 20, 200, 400, 444, 502, 532, 79

IAVA: 2020-A-0140, 2020-A-0328

RHSA: 2020:0160