SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Red Hat JBoss Vendors:   Red Hat
Red Hat JBoss EAP XML Deserialization Flaw in SLF4J Component Lets Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1040627
SecurityTracker URL:  http://securitytracker.com/id/1040627
CVE Reference:   CVE-2018-8088   (Links to External Site)
Date:  Apr 4 2018
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): EAP 6.4, 7.1
Description:   A vulnerability was reported in Red Hat JBoss Enterprise Application Platform (EAP). A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted XML data to trigger a deserialization error in the Simple Logging Facade for Java (SLF4J) EventData constructor and execute arbitrary code on the target system.

Chris McCown reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   Red Hat has issued a fix.

The Red Hat advisories are available at:

https://access.redhat.com/errata/RHSA-2018:0627
https://access.redhat.com/errata/RHSA-2018:0628
https://access.redhat.com/errata/RHSA-2018:0629
https://access.redhat.com/errata/RHSA-2018:0630

Vendor URL:  access.redhat.com/errata/RHSA-2018:0630 (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  5, 6, 7

Message History:   This archive entry has one or more follow-up message(s) listed below.
May 4 2018 (Red Hat Issues Fix for Red Hat Single Sign-On) Red Hat JBoss EAP XML Deserialization Flaw in SLF4J Component Lets Remote Users Execute Arbitrary Code on the Target System
Red Hat has issued a fix for Red Hat Single Sign-On for Red Hat Enterprise Linux.
May 17 2018 (Red Hat Issues Fix for Red Hat JBoss Data Grid) Red Hat JBoss EAP XML Deserialization Flaw in SLF4J Component Lets Remote Users Execute Arbitrary Code on the Target System
Red Hat has issued a fix for Red Hat JBoss Data Grid.
Oct 16 2018 (Red Hat Issues Fix) Red Hat JBoss EAP XML Deserialization Flaw in SLF4J Component Lets Remote Users Execute Arbitrary Code on the Target System
Red Hat has issued a fix for Red Hat Enterprise Linux.



 Source Message Contents

Subject:  [RHSA-2018:0630-01] Important: Red Hat JBoss Enterprise Application Platform 6.4 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 6.4 security update
Advisory ID:       RHSA-2018:0630-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:0630
Issue date:        2018-04-03
CVE Names:         CVE-2018-8088 
=====================================================================

1. Summary:

Updated packages that provide Red Hat JBoss Enterprise Application Platform
6.4 and fix three security issues, several bugs, and add various
enhancements are now available from the Red Hat Customer Portal.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This asynchronous patch is a security update for slf4j package in Red Hat
JBoss Enterprise Application Platform 6.4.

Security Fix(es):

* An XML deserialization vulnerability was discovered in slf4j's EventData
which accepts xml serialized string and can lead to arbitrary code
execution. (CVE-2018-8088)

The Simple Logging Facade for Java or (SLF4J) is a simple facade for
various logging APIs allowing the end-user to plug in the desired
implementation at deployment time. SLF4J also allows for a gradual
migration path away from Jakarta Commons Logging (JCL).

Red Hat would like to thank Chris McCown for reporting CVE-2018-8088.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contains a download link (you must
log in to download the update).

The JBoss server process must be restarted for the update to take effect.

4. Bugs fixed (https://bugzilla.redhat.com/):

1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution

5. References:

https://access.redhat.com/security/cve/CVE-2018-8088
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFaw8ZPXlSAg2UNWIIRAtLXAJwMWsqHQ8gBlGLWWywagmUrqwl32gCcC5gs
YNOpo/ghXGjIM1Qf+POpl6s=
=Ncqj
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC