Bug 1974891 (CVE-2021-34428)

Summary: CVE-2021-34428 jetty: SessionListener can prevent a session from being invalidated breaking logout
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: abenaiss, aileenc, akurtako, aos-bugs, ataylor, bibryam, bmontgom, chazlett, drieden, eclipse-sig, eparis, eric.wittmann, ggaughan, gmalinko, hbraun, janstey, java-sig-commits, jburrell, jjohnstn, jjoyce, jkang, jnethert, jochrist, jokerman, jross, jschluet, jwon, krzysztof.daniel, lhh, lpeer, mburns, mcoufal, mizdebsk, mkolesni, nstielau, pantinor, pbhattac, pjindal, sclewis, scohen, sd-operator-metering, slinaber, sochotni, sponnaga, swoodman, tflannag
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: jetty 9.4.41, jetty 10.0.3, jetty 11.0.3 Doc Type: If docs needed, set a value
Doc Text:
A flaw was discovered in the jetty-server, where if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts, this could result in a session not being invalidated and a shared-computer application being left logged in. The highest threat from this vulnerability is to data confidentiality and integrity.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-08-19 09:35:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1979036, 1972084, 1972088, 1972361, 1974892, 1981629, 1981630    
Bug Blocks: 1974893    

Description Guilherme de Almeida Suckevicz 2021-06-22 17:52:21 UTC
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.

Reference:
https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6

Comment 1 Guilherme de Almeida Suckevicz 2021-06-22 17:53:14 UTC
Created jetty tracking bugs for this issue:

Affects: fedora-all [bug 1974892]

Comment 3 Jonathan Christison 2021-06-30 12:16:49 UTC
This vulnerability is out of security support scope for the following products:

 * Red Hat JBoss Fuse 6
 * Red Hat JBoss A-MQ 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 4 Jonathan Christison 2021-06-30 12:28:11 UTC
Upstream Fixing commit: https://github.com/eclipse/jetty.project/commit/087f486b4461746b4ded45833887b3ccb136ee85

Comment 5 Jonathan Christison 2021-06-30 12:39:16 UTC
Explicitly Marking Red Hat Camel K and Camel Quarkus as having a low impact, although Camel K distributes jetty artifacts through camel-jetty, camel-jetty itself is not available for use by the application developer, http functionality is provided by the camel-k default runtime, Quarkus.

Explicitly Marking Red Hat Integration  Red Hat Integration Service Registry as having a low impact, although Service Registry distributes Jetty as part of Kafka Connect component it is not available in the productised release, meaning jetty is also not available for use by the end application developer.

Comment 12 errata-xmlrpc 2021-08-19 07:18:09 UTC
This issue has been addressed in the following products:

  Red Hat AMQ Streams 1.8.0

Via RHSA-2021:3225 https://access.redhat.com/errata/RHSA-2021:3225

Comment 13 Product Security DevOps Team 2021-08-19 09:35:11 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-34428

Comment 14 errata-xmlrpc 2021-09-30 09:58:16 UTC
This issue has been addressed in the following products:

  Red Hat AMQ 7.9.0

Via RHSA-2021:3700 https://access.redhat.com/errata/RHSA-2021:3700

Comment 15 errata-xmlrpc 2021-10-18 16:51:46 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.9

Via RHSA-2021:3758 https://access.redhat.com/errata/RHSA-2021:3758

Comment 16 errata-xmlrpc 2021-11-23 10:35:44 UTC
This issue has been addressed in the following products:

  Red Hat Integration

Via RHSA-2021:4767 https://access.redhat.com/errata/RHSA-2021:4767

Comment 17 errata-xmlrpc 2021-12-14 21:35:39 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.10

Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134