SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Web Server/CGI)  >   Red Hat JBoss Vendors:   Red Hat
Red Hat JBoss Data Grid Deserialization Flaw in Infinispan Lets Remote Authenticated Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1040360
SecurityTracker URL:  http://securitytracker.com/id/1040360
CVE Reference:   CVE-2014-9970, CVE-2017-15089, CVE-2017-7525   (Links to External Site)
Date:  Feb 12 2018
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Red Hat JBoss Data Grid. A remote authenticated user can execute arbitrary code on the target system.

A remote authenticated user can send specially crafted data to trigger a deserialization error in the Hotrod client in the Infinispan component to inject an arbitrary object into the data cache and potentially execute arbitrary code on the target client system.

Man Yue Mo (Semmle/lgtm.com) reported this vulnerability.

Impact:   A remote authenticated user can execute arbitrary code on the target client system.
Solution:   Red Hat has issued a fix (Data Grid 7.1.2).

The Red Hat advisory is available at:

https://access.redhat.com/errata/RHSA-2018:0294

Vendor URL:  access.redhat.com/errata/RHSA-2018:0294 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Red Hat Enterprise)

Message History:   None.


 Source Message Contents

Subject:  [RHSA-2018:0294-01] Important: Red Hat JBoss Data Grid 7.1.2 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Data Grid 7.1.2 security update
Advisory ID:       RHSA-2018:0294-01
Product:           Red Hat JBoss Data Grid
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:0294
Issue date:        2018-02-12
CVE Names:         CVE-2014-9970 CVE-2017-7525 CVE-2017-15089 
=====================================================================

1. Summary:

Red Hat JBoss Data Grid 7.1.2 is now available for download from the
Customer Portal.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Data Grid is a distributed in-memory data grid, based on
Infinispan.

This release of Red Hat JBoss Data Grid 7.1.2 serves as a replacement for
Red Hat JBoss Data Grid 7.1.1, and includes bug fixes and enhancements,
which are documented in the Release Notes document linked to in the
References.

Security Fix(es):

* A deserialization flaw was discovered in the jackson-databind which could
allow an unauthenticated user to perform code execution by sending the
maliciously crafted input to the readValue method of the ObjectMapper.
(CVE-2017-7525)

* It was found that the Hotrod client in Infinispan would unsafely read
deserialized data on information from the cache. An authenticated attacker
could inject a malicious object into the data cache and attain
deserialization on the client, and possibly conduct further attacks.
(CVE-2017-15089)

* A vulnerability was found in Jasypt that would allow an attacker to
perform a timing attack on password hash comparison. (CVE-2014-9970)

Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting
CVE-2017-7525 and Man Yue Mo (Semmle/lgtm.com) for reporting
CVE-2017-15089.

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the update).

Before applying the update, back up your existing Red Hat JBoss Data Grid
installation (including databases, configuration files, and so on).

4. Bugs fixed (https://bugzilla.redhat.com/):

1455566 - CVE-2014-9970 jasypt: Vulnerable to timing attack against the password hash comparison
1462702 - CVE-2017-7525 jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
1503610 - CVE-2017-15089 infinispan: Unsafe deserialization of malicious object injected into data cache

5. References:

https://access.redhat.com/security/cve/CVE-2014-9970
https://access.redhat.com/security/cve/CVE-2017-7525
https://access.redhat.com/security/cve/CVE-2017-15089
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid&downloadType=distributions&version=7.1.2
https://access.redhat.com/documentation/en-US/Red_Hat_JBoss_Data_Grid/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFagczfXlSAg2UNWIIRAiklAJoDbQxOZQQ7D8FZm+n+Ayrl0g6INACeKGdS
fRb6lZsQRwthr1F5mPiaZP8=
=1wIu
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, SecurityGlobal.net LLC