VARIoT IoT vulnerabilities database
| VAR-202004-2260 | No CVE | Shenzhen Dadian Technology Co., Ltd. has a SQL injection vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Shenzhen Dadian Technology Co., Ltd. is a company specializing in the research and development of IoT big data technology and its systems, located in Shenzhen.
There is a SQL injection vulnerability in the website construction system of Shenzhen Dadian Technology Co., Ltd., which can be used by attackers to obtain sensitive database information.
| VAR-202004-2221 | No CVE | Delta Electronics Enterprise Management (Shanghai) Co., Ltd. IEXplorer has unauthorized access vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
IEXplorer is an industrial Ethernet tool software that provides automatic search for Delta industrial Ethernet products, provides real-time monitoring of device connection status, quick IP address setting and software upgrade functions, applicable products include (DVS series, DVW series, IFD9506 , IFD9507, RTU-EN01, DVPEN01-SL, DVP12SE, DVP-FEN01, DVPSCM12-SL, DVPSCM52-SL, ASDA-M, CMC-MOD010).
Delta Electronics Enterprise Management (Shanghai) Co., Ltd. has an unauthorized access vulnerability in IEXplorer. Attackers can use the loopholes to access all functions of the software in an unauthorized state, and perform illegal operations.
| VAR-202004-2249 | No CVE | Unauthorized access vulnerability exists in the beenet interconnected enterprise router |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Established in October 2016, Chengdu Zhifengwang Technology Co., Ltd. is an emerging high-tech company integrating R&D, production and sales.
An unauthorized access vulnerability exists in the beenet interconnected enterprise router, which can be exploited by attackers to obtain sensitive website information.
| VAR-202004-1914 | CVE-2020-8004 | STMicroelectronics STM32F1 Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
STMicroelectronics STM32F1 devices have Incorrect Access Control. STMicroelectronics STM32F1 The device contains a vulnerability related to information leakage.Information may be obtained. STMicroelectronics STM32F1 is a 32-bit microcontroller based on ARM Cortex M3 from STMicroelectronics (STMicroelectronics). Attackers can use this vulnerability to obtain memory content
| VAR-202004-0392 | CVE-2020-10265 | Universal Robots Robot Controllers Vulnerability regarding lack of authentication for critical features in |
CVSS V2: 9.0 CVSS V3: 9.4 Severity: CRITICAL |
Universal Robots Robot Controllers Version CB2 SW Version 1.4 upwards, CB3 SW Version 3.0 and upwards, e-series SW Version 5.0 and upwards expose a service called DashBoard server at port 29999 that allows for control over core robot functions like starting/stopping programs, shutdown, reset safety and more. The DashBoard server is not protected by any kind of authentication or authorization. Universal Robots Robot Controllers There is a vulnerability in the lack of authentication for critical features.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
| VAR-202004-0391 | CVE-2020-10264 | Universal Robots Robot Controllers Vulnerability regarding information leakage in |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
CB3 SW Version 3.3 and upwards, e-series SW Version 5.0 and upwards allow authenticated access to the RTDE (Real-Time Data Exchange) interface on port 30004 which allows setting registers, the speed slider fraction as well as digital and analog Outputs. Additionally unautheticated reading of robot data is also possible. Universal Robots Robot Controllers There is an information leakage vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
| VAR-202004-2250 | No CVE | D-link DIR-823G router firmware in the web server has a buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
D-Link DIR-823G is a wireless router.
The web server in the firmware of the D-link DIR-823G router has a buffer overflow vulnerability. Attackers can use this vulnerability to cause buffer overflow attacks.
| VAR-202004-2251 | No CVE | D-link DIR-823G router firmware web server has remote command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
D-Link DIR-823G is a wireless router.
There is a remote command execution vulnerability in the web server of the D-link DIR-823G router firmware. The attacker uses the vulnerability to execute arbitrary operating system commands by sending a specially constructed POST request.
| VAR-202004-2252 | No CVE | D-link DIR-823G router has remote command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
D-Link DIR-823G is a wireless router.
D-link DIR-823G router has a remote command execution vulnerability. Attackers can use this vulnerability to execute arbitrary system commands.
| VAR-202004-2226 | No CVE | FATEK PM Designer has a memory corruption vulnerability (CNVD-2020-18784) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
PM Designer is a programmable logic controller.
FATEK PM Designer has a memory corruption vulnerability in handling plf files. Attackers can crash programs by constructing malformed files.
| VAR-202004-2217 | No CVE | FATEK PM Designer has a memory corruption vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
PM Designer is a programmable logic controller.
FATEK PM Designer has a memory corruption vulnerability in handling MID audio. Attackers can crash programs by constructing malformed files.
| VAR-202004-1907 | CVE-2020-5347 | Dell EMC Isilon OneFS Resource exhaustion vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Dell EMC Isilon OneFS versions 8.2.2 and earlier contain a denial of service vulnerability. SmartConnect had an error condition that may be triggered to loop, using CPU and potentially preventing other SmartConnect DNS responses. Dell EMC Isilon OneFS Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state. Dell EMC Isilon OneFS is a scale-out storage system for unstructured data from Dell
| VAR-202004-0297 | CVE-2020-11499 | Firmware Analysis and Comparison Tool Cross-site scripting vulnerability in |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Firmware Analysis and Comparison Tool (FACT) 3 has Stored XSS when updating analysis details via a localhost web request, as demonstrated by mishandling of the tags and version fields in helperFunctions/mongo_task_conversion.py. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
| VAR-202004-2030 | CVE-2020-6852 | CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP Authentication vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP with firmware 3.4.2.0919 has weak authentication of TELNET access, leading to root privileges without any password required. (DoS) It may be put into a state. CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP is a baby surveillance camera. An attacker can use this vulnerability to gain root permissions without a password
| VAR-202004-1864 | CVE-2020-9349 | CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP Vulnerability in lack of authentication in firmware \ |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP with firmware 3.4.2.0919 allows access to the RTSP service without a password
| VAR-202004-2176 | CVE-2020-8423 | TP-Link TL-WR841N V10 Classic buffer overflow vulnerability in device |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network. TP-Link TL-WR841N V10 A classic buffer overflow vulnerability exists on the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. TP-Link TL-WR841N is a wireless router of China TP-Link company. Remote attackers can use this vulnerability to execute arbitrary code with the help of GET requests
| VAR-202004-0373 | CVE-2020-10231 | plural TP-Link On the device NULL Pointer dereference vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
TP-Link NC200 through 2.1.8_Build_171109, NC210 through 1.0.9_Build_171214, NC220 through 1.3.0_Build_180105, NC230 through 1.3.0_Build_171205, NC250 through 1.3.0_Build_171205, NC260 through 1.5.1_Build_190805, and NC450 through 1.5.0_Build_181022 devices allow a remote NULL Pointer Dereference. plural TP-Link On the device NULL A vulnerability exists regarding pointer dereference.Service operation interruption (DoS) It may be put into a state. Vulnerability title: TP-LINK Cloud Cameras NCXXX Remote NULL Pointer Dereference
Author: Pietro Oliva
CVE: CVE-2020-10231
Vendor: TP-LINK
Product: NC200, NC210, NC220, NC230, NC250, NC260, NC450
Affected version: NC200 <= 2.1.8 build 171109, NC210 <= 1.0.9 build 171214,
NC220 <= 1.3.0 build 180105, NC230 <= 1.3.0 build 171205,
NC250 <= 1.3.0 build 171205, NC260 <= 1.5.1 build 190805,
NC450 <= 1.5.0 build 181022
Description:
The issue is located in the httpLoginRpm method of the ipcamera binary (handler
method for /login.fcgi), where after successful login, there is no check for
NULL in the return value of httpGetEnv(environment, "HTTP_USER_AGENT"). Shortly
after that, there is a call to strstr(user_agent_string, "Firefox") and if a
User-Agent header is not specified by the client, httpGetEnv will return NULL,
and a NULL pointer dereference occurs when calling strstr, with consequent crash
of the ipcamera process.
Impact:
After the crash, the web interface on port 80 will not be available anymore.
Exploitation:
An attacker could exploit this issue by just sending a login request with valid
credentials (such as admin or limited user), but without an user-agent HTTP
header. Default credentials can be used to bypass the credentials requirement.
Evidence:
The disassembly of affected code from an NC200 camera is shown below:
0x0047dca0 lw a0, (user_arg)
0x0047dca4 lw a1, (password_arg)
0x0047dca8 lw t9, -sym.swUMMatchPassword(gp)
0x0047dcac nop
0x0047dcb0 jalr t9
0x0047dcb4 nop
0x0047dcb8 lw gp, (saved_gp)
0x0047dcbc sw v0, (auth_result)
0x0047dcc0 lw v0, (auth_result)
0x0047dcc4 nop
0x0047dcc8 bnez v0, 0x47de34
0x0047dccc nop
0x0047dcd0 sw zero, (arg_54h)
0x0047dcd4 lw a0, (environment)
0x0047dcd8 lw a1, -0x7fe4(gp)
0x0047dcdc nop
0x0047dce0 addiu a1, a1, -0x7cb0 ; "HTTP_USER_AGENT"
0x0047dce4 lw t9, -sym.httpGetEnv(gp)
0x0047dce8 nop
0x0047dcec jalr t9
0x0047dcf0 nop
0x0047dcf4 lw gp, (saved_gp)
0x0047dcf8 sw v0, (user_agent_ptr)
0x0047dcfc lw a0, (user_agent_ptr) ; <== This pointer could be NULL
0x0047dd00 lw a1, -0x7fe4(gp)
0x0047dd04 nop
0x0047dd08 addiu a1, a1, -0x7ca0 ; "Firefox"
0x0047dd0c lw t9, -sym.imp.strstr(gp)
0x0047dd10 nop
0x0047dd14 jalr t9
Disclosure timeline:
2nd December 2019 - Initial vulnerability report for NC200.
4th December 2019 - Vendor confirms vulnerablity but does not start fixing
due to the product being end-of-life.
4th December 2019 - Notified vendor the vulnerability details will be public
and it should be fixed.
6th December 2019 - Thanks for your opinion, we will discuss and write back
to you.
<silence>
7th February 2020 - Notified vendor issue exists on NC450 and possibly all
models in between. Fixed a disclosure deadline in 30 days.
8th February 2020 - Vendor: We will check but please be patient.
18th February 2020 - We failed to reproduce the issue with the provided PoC.
<trying to troubleshoot>
24th February 2020 - Reverse engineered all the firmware images on behalf of
the vendor and notified they were all vulnerable.
2nd March 2020 - Vendor asks to check fixes for NC200.
2nd March 2020 - Confirmed fix. Asked the vendor to do the same on all cameras.
3rd March 2020 - Vendor will check on other cameras, but will take some time.
3rd March 2020 - Asked the vendor to be quick.
9th March 2020 - Notified CVE identifier to vendor, gave extra week to patch.
9th March 2020 - Vendor is testing fix on all models.
13th March 2020 - Vendor asks to confirm fixes.
13th March 2020 - Confirmed fixes and asked the vendor to publish updates.
Disclosure delayed one week to give some time to patch if
the vendor published firmware updates.
29th March 2020 - No updates have been made public by the vendor. Releasing
details to the public after almost 4 months from initial
notification
| VAR-202004-0983 | CVE-2020-1954 | Apache CXF Information disclosure vulnerability |
CVSS V2: 2.9 CVSS V3: 5.3 Severity: MEDIUM |
Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the ‘createMBServerConnectorFactory‘ property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX. Apache CXF is an open source Web service framework of the Apache Software Foundation. The framework supports a variety of Web service standards, a variety of front-end programming API and so on. An information disclosure vulnerability exists in Apache CXF versions prior to 3.2.13 and versions prior to 3.3.6. An attacker could exploit this vulnerability to obtain sensitive information. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 8
Advisory ID: RHSA-2020:4245-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4245
Issue date: 2020-10-13
CVE Names: CVE-2020-1954 CVE-2020-14299 CVE-2020-14338
CVE-2020-14340
====================================================================
1. Summary:
An update is now available for Red Hat JBoss Enterprise Application
Platform 7.3 for RHEL 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat JBoss EAP 7.3 for BaseOS-8 - noarch, x86_64
3. Description:
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.
This release of Red Hat JBoss Enterprise Application Platform 7.3.3 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.2
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.3.3 Release Notes for information about the most
significant bug fixes and enhancements included in this release.
Security Fix(es):
* picketbox: JBoss EAP reload to admin-only mode allows authentication
bypass (CVE-2020-14299)
* wildfly: XML validation manipulation due to incomplete application of
use-grammar-pool-only in xercesImpl (CVE-2020-14338)
* xnio: file descriptor leak caused by growing amounts of NIO Selector file
handles may lead to DoS (CVE-2020-14340)
* cxf: JMX integration is vulnerable to a MITM attack (CVE-2020-1954)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.
For details about how to apply this update, see:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1824301 - CVE-2020-1954 cxf: JMX integration is vulnerable to a MITM attack
1848533 - CVE-2020-14299 picketbox: JBoss EAP reload to admin-only mode allows authentication bypass
1860054 - CVE-2020-14338 wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl
1860218 - CVE-2020-14340 xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS
6. JIRA issues fixed (https://issues.jboss.org/):
JBEAP-19379 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.17 to 5.3.18
JBEAP-19444 - Tracker bug for the EAP 7.3.3 release for RHEL-8
JBEAP-19596 - [GSS](7.3.z) CMTOOL-277 - Migration from EAP 6.4 Update 22 to EAP 7.3 create a misspelled 'Application Realm'
JBEAP-19613 - (7.3.z) ELY-1975 - Update AcmeClientSpi#obtainCertificate so that it obtains the order URL from the response to newOrder
JBEAP-19615 - (7.3.z) ELY-1968 - Update error message returned by AcmeClientSpi#getLocation
JBEAP-19642 - (7.3.z) Upgrade jberet-core from 1.3.5.Final to 1.3.7.Final
JBEAP-19695 - [GSS](7.3.z) Upgrade Apache CXF from 3.3.5 to 3.3.7
JBEAP-19698 - [GSS](7.3.z) Upgrade Invocation from 1.5.2.Final-redhat-00001 to 1.5.3.Final...
JBEAP-19700 - [GSS](7.3.z) Upgrade Migration Tool from 1.7.1-redhat-00003 to 1.7.2-redhat-00001
JBEAP-19701 - [GSS](7.3.z) Upgrade jgroups from 4.1.4.Final-redhat-00001 to 4.1.10.Final-redhat-00001
JBEAP-19715 - [GSS](7.3.z) Upgrade Artemis Native to 1.0.2
JBEAP-19746 - [GSS](7.3.z) Upgrade JBoss Log Manager from 2.1.15 to 2.1.17
JBEAP-19789 - [GSS](7.3.z) Upgrade Narayana from 5.9.8.Final to 5.9.9.Final
JBEAP-19791 - [GSS](7.3.z) Upgrade HAL from 3.2.9.Final-redhat-00001 to 3.2.10.Final-redhat-00001
JBEAP-19795 - (7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP11-redhat-00001 to 2.3.9.SP12-redhat-00001
JBEAP-19796 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00010 to 2.9.0.redhat-00011
JBEAP-19822 - (7.3.z) Upgrade MP fault-tolerance to 2.1.1
JBEAP-19888 - (7.3.z) Upgrade SmallRye OpenAPI to 1.1.23
JBEAP-19934 - (7.3.z) Upgrade bouncycastle to 1.65
JBEAP-19935 - (7.3.z) Upgrade commons-codec to 1.14
JBEAP-19936 - (7.3.z) Upgrade commons-lang3 from 3.9 to 3.10
JBEAP-19937 - (7.3.z) Upgrade snakeyaml to 1.26
JBEAP-19938 - (7.3.z) Upgrade velocity to 2.2
JBEAP-19939 - (7.3.z) Upgrade httpcomponents httpclient from 4.5.4 to 4.5.12
JBEAP-19940 - (7.3.z) Upgrade httpcomponents httpcore from 4.4.5 to 4.4.13
JBEAP-19942 - (7.3.z) Upgrade XNIO from 3.7.8.SP1 to 3.7.9.Final
JBEAP-19955 - (7.3.z) Update xmlschema to 2.2.5
JBEAP-19965 - (7.3.z) Fix PreservePathTestCase after httpclient upgrade
JBEAP-20027 - (7.3.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00012 to 2.5.5.SP12-redhat-00013
JBEAP-20037 - [GSS](7.3.z) Upgrade wildfly-transaction-client from 1.1.11.Final-redhat-00001 to 1.1.13.Final-redhat-00001
JBEAP-20064 - (7.3.z) Update PR template to include PR-processor hints for wildfly-core-eap
JBEAP-20087 - [GSS](7.3.z) WFLY-13147 - Deployment slowdown after WFLY upgrade (DeploymentArchive handling)
JBEAP-20112 - (7.3.z) Upgrade smallrye-fault-tolerance to 4.2.1
7. Package List:
Red Hat JBoss EAP 7.3 for BaseOS-8:
Source:
eap7-activemq-artemis-2.9.0-5.redhat_00011.1.el8eap.src.rpm
eap7-activemq-artemis-native-1.0.2-1.redhat_00001.1.el8eap.src.rpm
eap7-apache-commons-codec-1.14.0-1.redhat_00001.1.el8eap.src.rpm
eap7-apache-commons-lang-3.10.0-1.redhat_00001.1.el8eap.src.rpm
eap7-apache-cxf-3.3.7-1.redhat_00001.1.el8eap.src.rpm
eap7-artemis-native-1.0.2-3.redhat_1.el8eap.src.rpm
eap7-bouncycastle-1.65.0-1.redhat_00001.1.el8eap.src.rpm
eap7-glassfish-jsf-2.3.9-11.SP12_redhat_00001.1.el8eap.src.rpm
eap7-hal-console-3.2.10-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-hibernate-5.3.18-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-httpcomponents-client-4.5.12-1.redhat_00001.1.el8eap.src.rpm
eap7-httpcomponents-core-4.4.13-1.redhat_00001.1.el8eap.src.rpm
eap7-jberet-1.3.7-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-invocation-1.5.3-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-logmanager-2.1.17-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-server-migration-1.7.2-2.Final_redhat_00002.1.el8eap.src.rpm
eap7-jboss-xnio-base-3.7.9-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jgroups-4.1.10-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-narayana-5.9.9-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-picketbox-5.0.3-8.Final_redhat_00007.1.el8eap.src.rpm
eap7-picketlink-bindings-2.5.5-25.SP12_redhat_00013.1.el8eap.src.rpm
eap7-snakeyaml-1.26.0-1.redhat_00001.1.el8eap.src.rpm
eap7-undertow-2.0.31-1.SP1_redhat_00001.1.el8eap.src.rpm
eap7-velocity-2.2.0-1.redhat_00001.1.el8eap.src.rpm
eap7-wildfly-7.3.3-4.GA_redhat_00004.1.el8eap.src.rpm
eap7-wildfly-elytron-1.10.8-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-transaction-client-1.1.13-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-ws-commons-XmlSchema-2.2.5-1.redhat_00001.1.el8eap.src.rpm
eap7-xerces-j2-2.12.0-2.SP03_redhat_00001.1.el8eap.src.rpm
noarch:
eap7-activemq-artemis-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-cli-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-commons-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-core-client-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-dto-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-hornetq-protocol-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-hqclient-protocol-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-jdbc-store-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-jms-client-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-jms-server-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-journal-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-native-1.0.2-1.redhat_00001.1.el8eap.noarch.rpm
eap7-activemq-artemis-ra-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-selector-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-server-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-service-extensions-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-activemq-artemis-tools-2.9.0-5.redhat_00011.1.el8eap.noarch.rpm
eap7-apache-commons-codec-1.14.0-1.redhat_00001.1.el8eap.noarch.rpm
eap7-apache-commons-lang-3.10.0-1.redhat_00001.1.el8eap.noarch.rpm
eap7-apache-cxf-3.3.7-1.redhat_00001.1.el8eap.noarch.rpm
eap7-apache-cxf-rt-3.3.7-1.redhat_00001.1.el8eap.noarch.rpm
eap7-apache-cxf-services-3.3.7-1.redhat_00001.1.el8eap.noarch.rpm
eap7-apache-cxf-tools-3.3.7-1.redhat_00001.1.el8eap.noarch.rpm
eap7-bouncycastle-1.65.0-1.redhat_00001.1.el8eap.noarch.rpm
eap7-bouncycastle-mail-1.65.0-1.redhat_00001.1.el8eap.noarch.rpm
eap7-bouncycastle-pkix-1.65.0-1.redhat_00001.1.el8eap.noarch.rpm
eap7-bouncycastle-prov-1.65.0-1.redhat_00001.1.el8eap.noarch.rpm
eap7-glassfish-jsf-2.3.9-11.SP12_redhat_00001.1.el8eap.noarch.rpm
eap7-hal-console-3.2.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-5.3.18-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-core-5.3.18-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.18-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-envers-5.3.18-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-java8-5.3.18-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-httpcomponents-client-4.5.12-1.redhat_00001.1.el8eap.noarch.rpm
eap7-httpcomponents-core-4.4.13-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jberet-1.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jberet-core-1.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-invocation-1.5.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-logmanager-2.1.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-server-migration-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-cli-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-core-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.3-server-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly15.0-server-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly16.0-server-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly17.0-server-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly18.0-server-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.7.2-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-jboss-xnio-base-3.7.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jgroups-4.1.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-compensations-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jbosstxbridge-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jbossxts-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jts-idlj-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jts-integration-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-api-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-bridge-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-integration-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-util-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-txframework-5.9.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-picketbox-5.0.3-8.Final_redhat_00007.1.el8eap.noarch.rpm
eap7-picketbox-infinispan-5.0.3-8.Final_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-bindings-2.5.5-25.SP12_redhat_00013.1.el8eap.noarch.rpm
eap7-picketlink-wildfly8-2.5.5-25.SP12_redhat_00013.1.el8eap.noarch.rpm
eap7-snakeyaml-1.26.0-1.redhat_00001.1.el8eap.noarch.rpm
eap7-undertow-2.0.31-1.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-velocity-2.2.0-1.redhat_00001.1.el8eap.noarch.rpm
eap7-velocity-engine-core-2.2.0-1.redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-7.3.3-4.GA_redhat_00004.1.el8eap.noarch.rpm
eap7-wildfly-elytron-1.10.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-elytron-tool-1.10.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-javadocs-7.3.3-4.GA_redhat_00004.1.el8eap.noarch.rpm
eap7-wildfly-modules-7.3.3-4.GA_redhat_00004.1.el8eap.noarch.rpm
eap7-wildfly-transaction-client-1.1.13-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ws-commons-XmlSchema-2.2.5-1.redhat_00001.1.el8eap.noarch.rpm
eap7-xerces-j2-2.12.0-2.SP03_redhat_00001.1.el8eap.noarch.rpm
x86_64:
eap7-artemis-native-1.0.2-3.redhat_1.el8eap.x86_64.rpm
eap7-artemis-native-wildfly-1.0.2-3.redhat_1.el8eap.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
8. References:
https://access.redhat.com/security/cve/CVE-2020-1954
https://access.redhat.com/security/cve/CVE-2020-14299
https://access.redhat.com/security/cve/CVE-2020-14338
https://access.redhat.com/security/cve/CVE-2020-14340
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/
9. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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OgA5
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Summary:
This is a security update for JBoss EAP Continuous Delivery 20. Description:
Red Hat Decision Manager is an open source decision management platform
that combines business rules management, complex event processing, Decision
Model & Notation (DMN) execution, and Business Optimizer for solving
planning problems. It automates business decisions and makes that logic
available to the entire business.
Security Fix(es):
* hibernate: SQL injection issue in Hibernate ORM (CVE-2019-14900)
* batik: SSRF via "xlink:href" (CVE-2019-17566)
* Wildfly: Improper authorization issue in WildFlySecurityManager when
using alternative protection domain (CVE-2020-1748)
* ant: insecure temporary file vulnerability (CVE-2020-1945)
* dom4j: XML External Entity vulnerability in default SAX parser
(CVE-2020-10683)
* hibernate-validator: Improper input validation in the interpolation of
constraint error messages (CVE-2020-10693)
* wildfly-elytron: session fixation when using FORM authentication
(CVE-2020-10714)
* cxf: JMX integration is vulnerable to a MITM attack (CVE-2020-1954)
* mysql-connector-java: allows unauthenticated attacker with network access
via multiple protocols to compromise MySQL Connectors which could result in
unauthorized update, insert or delete (CVE-2020-2875)
* mysql-connector-java: allows high privileged attacker with network access
via multiple protocols to compromise MySQL Connectors which could result in
unauthorized partial DoS (CVE-2020-2933)
* mysql-connector-java: allows unauthenticated attacker with network access
via multiple protocols to compromise MySQL Connectors which could result in
unauthorized update, insert or delete (CVE-2020-2934)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
It is recommended to halt the server by stopping the JBoss Application
Server process before installing this update; after installing the update,
restart the server by starting the JBoss Application Server process.
The References section of this erratum contains a download link (you must
log in to download the update). Bugs fixed (https://bugzilla.redhat.com/):
1666499 - CVE-2019-14900 hibernate: SQL injection issue in Hibernate ORM
1694235 - CVE-2020-10683 dom4j: XML External Entity vulnerability in default SAX parser
1805501 - CVE-2020-10693 hibernate-validator: Improper input validation in the interpolation of constraint error messages
1807707 - CVE-2020-1748 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain
1824301 - CVE-2020-1954 cxf: JMX integration is vulnerable to a MITM attack
1825714 - CVE-2020-10714 wildfly-elytron: session fixation when using FORM authentication
1837444 - CVE-2020-1945 ant: insecure temporary file vulnerability
1848617 - CVE-2019-17566 batik: SSRF via "xlink:href"
1851014 - CVE-2020-2934 mysql-connector-java: allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors which could result in unauthorized update, insert or delete
1851019 - CVE-2020-2875 mysql-connector-java: allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors which could result in unauthorized update, insert or delete
1851022 - CVE-2020-2933 mysql-connector-java: allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors which could result in unauthorized partial DoS
5. Description:
Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications
| VAR-202004-1804 | CVE-2020-8144 | UniFi Video Past Traversal Vulnerability in |
CVSS V2: 5.2 CVSS V3: 8.4 Severity: HIGH |
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware update information. If the version field contains ..\ character sequences, the destination file path to save the firmware can be manipulated to be outside the intended destination directory tree. Fixed in UniFi Video Controller v3.10.3 and newer. UniFi Video Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
| VAR-202004-0689 | CVE-2019-3944 | Parrot ANAFI Vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Parrot ANAFI is vulnerable to Wi-Fi deauthentication attack, allowing remote and unauthenticated attackers to disconnect drone from controller during mid-flight. Parrot ANAFI There is an unspecified vulnerability in.Service operation interruption (DoS) It may be put into a state. Parrot ANAFI is a drone device