Bug 1955113 (CVE-2021-31917) - CVE-2021-31917 Infinispan: Authentication bypass on REST endpoints when using DIGEST authentication mechanism
Summary: CVE-2021-31917 Infinispan: Authentication bypass on REST endpoints when using...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-31917
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1955115 1955254 2002256
TreeView+ depends on / blocked
 
Reported: 2021-04-29 13:28 UTC by Jonathan Christison
Modified: 2021-09-08 11:04 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Red Hat DataGrid and Infinispan. An attacker could bypass authentication on all REST endpoints when DIGEST is used as the authentication method. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Clone Of:
Environment:
Last Closed: 2021-05-26 23:32:58 UTC
Embargoed:


Attachments (Terms of Use)

Description Jonathan Christison 2021-04-29 13:28:33 UTC
A flaw was found in Red Hat DataGrid 8.x (8.0.0, 8.0.1, 8.1.0 and 8.1.1) and Infinispan (10.0.0 through 12.0.0) where an attacker can bypass authentication in a trivial manor on all REST endpoints when `DIGEST` is used as the authentication method (`authentication mechanisms`).

Comment 1 Jonathan Christison 2021-04-29 13:28:37 UTC
Acknowledgments:

Name: Ryan Emerson (Red Hat)

Comment 5 errata-xmlrpc 2021-05-26 21:50:27 UTC
This issue has been addressed in the following products:

  Red Hat Data Grid 8.2.0

Via RHSA-2021:2139 https://access.redhat.com/errata/RHSA-2021:2139

Comment 6 Product Security DevOps Team 2021-05-26 23:32:58 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-31917

Comment 7 Product Security DevOps Team 2021-05-27 05:32:07 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-31917


Note You need to log in before you can comment on or make changes to this bug.