Lucene search

K
redhatRedHatRHSA-2024:3385
HistoryMay 28, 2024 - 11:17 a.m.

(RHSA-2024:3385) Moderate: Red Hat JBoss EAP 7.4.14 XP 4.0.2.GA security release

2024-05-2811:17:57
access.redhat.com
17
red hat jboss
eap 7.4.14
xp 4.0.2.ga
security update
jetty-server
cookie parsing
outofmemoryerror
okio
cve-2023-26049
cve-2023-26048
cve-2023-3635

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

Low

EPSS

0.002

Percentile

61.6%

This asynchronous patch is a security update zip for the JBoss EAP XP 4.0.2 runtime distribution for use with EAP 7.4.14.

Security Fix(es):

  • jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies (CVE-2023-26049)

  • jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() (CVE-2023-26048)

  • okio: GzipSource class improper exception handling (CVE-2023-3635)

A Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

Low

EPSS

0.002

Percentile

61.6%