Bug 1948001 (CVE-2021-3536)

Summary: CVE-2021-3536 wildfly: XSS via admin console when creating roles in domain mode
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: 160209351, aboyko, aileenc, akoufoud, alazarot, almorale, anstephe, asoldano, atangrin, ataylor, avibelli, bbaranow, bgeorges, bibryam, bmaxwell, brian.stansberry, cdewolf, chazlett, clement.escoffier, cmoulliard, dandread, darran.lofthouse, dkreling, dosoudil, drieden, eleandro, eric.wittmann, etirelli, extras-orphan, fjuma, ggaughan, gmalinko, gsmet, hamadhan, hbraun, ibek, ikanello, iweiss, janstey, java-sig-commits, jnethert, jochrist, jpallich, jperkins, jross, jstastny, jwon, krathod, kverlaen, kwills, lef, lgao, lthon, mnovotny, msochure, msvehla, mszynkie, nwallace, pantinor, pdrozd, peholase, pgallagh, pjindal, pmackay, probinso, puntogil, rfreire, rguimara, rrajasek, rruss, rstancel, rsvoboda, sbiarozk, sdouglas, security-response-team, smaestri, sthorger, tom.jenkinson, tzimanyi, yborgess
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Wildfly 23.0.2.Final Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Wildfly. While creating a new role in the domain mode via the admin console, it is possible to add a payload in the name field, leading to a Cross-site scripting attack (XSS). The highest threat from this vulnerability is to confidentiality and integrity.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-07-13 21:54:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1928232, 1957379    

Description Guilherme de Almeida Suckevicz 2021-04-09 17:47:23 UTC
A flaw was found in Wildfly. When creating a new role in domain mode via the admin console, is possible to add a payload in the name field, leading to XSS.

Comment 4 Guilherme de Almeida Suckevicz 2021-04-12 14:25:33 UTC
Acknowledgments:

Name: Damian Bury

Comment 11 Todd Cullum 2021-05-17 22:54:32 UTC
Statement:

This flaw does not affect Red Hat CodeReady Studio 12 because only the wildfly client is used and domain mode is not used.

Comment 12 Jonathan Christison 2021-06-15 10:11:35 UTC
Marking Red Hat AMQ Broker 7 as not being affected, it does not consume the affected org.jboss.hal:hal-ballroom component

Comment 13 errata-xmlrpc 2021-07-13 12:59:47 UTC
This issue has been addressed in the following products:

  EAP 7.3.8

Via RHSA-2021:2696 https://access.redhat.com/errata/RHSA-2021:2696

Comment 14 errata-xmlrpc 2021-07-13 13:00:51 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 7

Via RHSA-2021:2693 https://access.redhat.com/errata/RHSA-2021:2693

Comment 15 errata-xmlrpc 2021-07-13 13:07:12 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 6

Via RHSA-2021:2692 https://access.redhat.com/errata/RHSA-2021:2692

Comment 16 errata-xmlrpc 2021-07-13 13:11:39 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 8

Via RHSA-2021:2694 https://access.redhat.com/errata/RHSA-2021:2694

Comment 17 Product Security DevOps Team 2021-07-13 21:54:45 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3536

Comment 18 errata-xmlrpc 2021-07-15 15:26:18 UTC
This issue has been addressed in the following products:

  Red Hat EAP-XP 2.0.0 via EAP 7.3.x base

Via RHSA-2021:2755 https://access.redhat.com/errata/RHSA-2021:2755

Comment 19 Jonathan Christison 2021-07-19 10:58:40 UTC
Marking Red Hat Process Automation Manager and Red Hat Decision Manager (RHPAM & RHDM) as not affected, this is because it does not consume the affected org.jboss.hal:hal-ballroom component.

Comment 20 errata-xmlrpc 2021-07-29 19:19:21 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4.8

Via RHSA-2021:2965 https://access.redhat.com/errata/RHSA-2021:2965

Comment 21 Jonathan Christison 2021-09-01 15:31:10 UTC
Marking Red Hat Integration Camel-K, Camel-Quarkus and Service Registry as not affected, this is because none of these products consume the affected org.jboss.hal:hal-ballroom component.

Comment 22 errata-xmlrpc 2021-09-23 16:15:34 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2021:3656 https://access.redhat.com/errata/RHSA-2021:3656

Comment 23 errata-xmlrpc 2021-09-23 16:23:54 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2021:3658 https://access.redhat.com/errata/RHSA-2021:3658

Comment 24 errata-xmlrpc 2021-09-23 16:29:41 UTC
This issue has been addressed in the following products:

  EAP 7.4.1 release

Via RHSA-2021:3660 https://access.redhat.com/errata/RHSA-2021:3660

Comment 25 errata-xmlrpc 2021-12-14 21:35:01 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.10

Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134