-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Single Sign-On 7.5.1 security update
Advisory ID:       RHSA-2022:0155-01
Product:           Red Hat Single Sign-On
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:0155
Issue date:        2022-01-17
CVE Names:         CVE-2021-3827 CVE-2021-4133 CVE-2021-20289 
                   CVE-2021-40690 
====================================================================
1. Summary:

A security update is now available for Red Hat Single Sign-On 7.5 from the
Customer Portal.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.5.1 serves as a replacement for
Red Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements,
which are documented in the Release Notes document linked to in the
References.

Security Fix(es):

* Keycloak: Incorrect authorization allows unpriviledged users to create
other users (CVE-2021-4133)

* keycloak-server-spi-private: ECP SAML binding bypasses authentication
flows (CVE-2021-3827)

* xml-security: XPath Transform abuse allows for information disclosure
(CVE-2021-40690)

* resteasy: Error message exposes endpoint class information
(CVE-2021-20289)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1935927 - CVE-2021-20289 resteasy: Error message exposes endpoint class information
2007512 - CVE-2021-3827 keycloak-server-spi-private: ECP SAML binding bypasses authentication flows
2011190 - CVE-2021-40690 xml-security: XPath Transform abuse allows for information disclosure
2033602 - CVE-2021-4133 Keycloak: Incorrect authorization allows unpriviledged users to create other users
5. JIRA issues fixed (https://issues.redhat.com/):

CIAM-1176 - 7.5.1 Deliverables - RPMs

6. References:

https://access.redhat.com/security/cve/CVE-2021-3827
https://access.redhat.com/security/cve/CVE-2021-4133
https://access.redhat.com/security/cve/CVE-2021-20289
https://access.redhat.com/security/cve/CVE-2021-40690
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches&product=core.service.rhsso&version=7.5
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYeYFzNzjgjWX9erEAQh2wBAAoTGpTmDqsgKn3gRuWUJExRrYjCyEpxDq
x8jPIGz1e5q4UPeXgtRYBxALhndun1jXGheQ3gHoJx2BJrawb7u2d7g3waQ+dPJB
W+IZNbIExUWgY3WS5BW5a7koK3dcpsGnvuhxREV9cPPQDopmU5eWOUDk2k09dbqX
3scRGkDA1luhvIPc06ZwsSOTraw0SMaHYGNOAHNIaG/Ag4U/cyGBvu67skphI84k
RL41sdNgDdZnCxsawL8DqkO4riYJvgwbSjCB6flBTuotfckn9wyjGXRYNMkI0tZ0
cVTJBuTxsH5p/J6qxwkVO5XprjjiZZ0aZAfh6KtJ/19yXr/KAsTeNWHOgfNueq3c
/DycSgwfSLHon1qVl6I8RNtVpnmekA2ruxjitXNAJa/Vr7lKyI3Fvd/3jNN/ZYhN
jydEnU1kh7MpckouA8yNODF1Q1jhzSJIoXb2par5SCAp1uhWF1LIESYUtReGI5e8
p+GZhWJBGFvuG9i1SSmgUuvvDfrMOosl7E0V2A5XB2ZhEA8pQLZmtU2G8R6EAuS5
zXE5kN1GbHzCTJd++TPMBE9sA1Pf2woG73l1upD1wgewhZtlWnk2j/K1ttr9pEwJ
L35d8D43wymuwJsTsRj15rNywl6BYcLgkvzzNGfSk5qbSi05AYeRAPJQ94Q3hsAy
Gh4Uz4poQ1c=J6pm
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-0155:03 Important: Red Hat Single Sign-On 7.5.1 security

A security update is now available for Red Hat Single Sign-On 7.5 from the Customer Portal

Summary

Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.
This release of Red Hat Single Sign-On 7.5.1 serves as a replacement for Red Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)
* keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link (you must log in to download the update).

References

https://access.redhat.com/security/cve/CVE-2021-3827 https://access.redhat.com/security/cve/CVE-2021-4133 https://access.redhat.com/security/cve/CVE-2021-20289 https://access.redhat.com/security/cve/CVE-2021-40690 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches&product=core.service.rhsso&version=7.5 https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/

Package List


Severity
Advisory ID: RHSA-2022:0155-01
Product: Red Hat Single Sign-On
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0155
Issued Date: : 2022-01-17
CVE Names: CVE-2021-3827 CVE-2021-4133 CVE-2021-20289 CVE-2021-40690

Topic

A security update is now available for Red Hat Single Sign-On 7.5 from theCustomer Portal.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1935927 - CVE-2021-20289 resteasy: Error message exposes endpoint class information

2007512 - CVE-2021-3827 keycloak-server-spi-private: ECP SAML binding bypasses authentication flows

2011190 - CVE-2021-40690 xml-security: XPath Transform abuse allows for information disclosure

2033602 - CVE-2021-4133 Keycloak: Incorrect authorization allows unpriviledged users to create other users

5. JIRA issues fixed (https://issues.redhat.com/):

CIAM-1176 - 7.5.1 Deliverables - RPMs


Related News