Back to bug 1860138

Who When What Removed Added
Dave Baker 2020-07-23 19:15:07 UTC CC security-response-team
Dave Baker 2020-07-23 19:19:12 UTC Comment 2 updated
Dave Baker 2020-07-23 19:27:14 UTC CC aboyko, chazlett, drieden, krathod, pdrozd, pjindal, sthorger
Dhananjay Arunesh 2020-07-24 07:08:49 UTC Summary EMBARGOED RHSSO: test connection function in console permits timing based port scanning EMBARGOED CVE-2020-14341 RHSSO: test connection function in console permits timing based port scanning
Alias CVE-2020-14341
Paramvir jindal 2020-11-18 06:30:07 UTC Group security, qe_staff
Summary EMBARGOED CVE-2020-14341 RHSSO: test connection function in console permits timing based port scanning CVE-2020-14341 RHSSO: test connection function in console permits timing based port scanning
Pedro Sampaio 2021-01-12 00:40:12 UTC Comment 0 updated
Pedro Sampaio 2021-01-12 00:40:16 UTC CC psampaio
Eric Christensen 2021-02-23 16:08:15 UTC Doc Text A flaw was found in Red Hat Single Sign On. A test connection available on the application console can permit an authorized user to cause SMTP connections to be attempted to arbitrary hosts and ports of the user's choosing. By observing differences in the timings of these scans, an attacker may glean information about hosts and ports which they do not have access to scan directly. The highest threat from this vulnerability is to data confidentiality.
Red Hat Bugzilla 2021-07-09 23:30:06 UTC CC cbyrne
Red Hat Bugzilla 2022-10-28 13:12:41 UTC CC krathod
Red Hat Bugzilla 2022-12-31 23:43:15 UTC CC aboyko
Red Hat Bugzilla 2023-05-15 18:09:13 UTC CC drieden
Red Hat Bugzilla 2023-07-07 08:28:44 UTC Assignee security-response-team nobody
CC security-response-team

Back to bug 1860138