Bug 1801726 (CVE-2020-1732) - CVE-2020-1732 Soteria: security identity corruption across concurrent threads
Summary: CVE-2020-1732 Soteria: security identity corruption across concurrent threads
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-1732
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1798612
TreeView+ depends on / blocked
 
Reported: 2020-02-11 14:33 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-03-04 13:36 UTC (History)
79 users (show)

Fixed In Version: soteria 1.0.1
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in WildFly where multiple requests occurring concurrently could be handled using the identity of another request. This vulnerability occurs when using EE Security with WildFly Elytron. The largest threat from this vulnerability is data confidentiality and integrity.
Clone Of:
Environment:
Last Closed: 2020-05-12 10:32:45 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:2058 0 None None None 2020-05-11 20:10:54 UTC
Red Hat Product Errata RHSA-2020:2059 0 None None None 2020-05-11 20:13:57 UTC
Red Hat Product Errata RHSA-2020:2060 0 None None None 2020-05-11 20:16:55 UTC
Red Hat Product Errata RHSA-2020:2061 0 None None None 2020-05-11 20:20:05 UTC
Red Hat Product Errata RHSA-2020:2333 0 None None None 2020-05-28 16:00:02 UTC
Red Hat Product Errata RHSA-2020:2905 0 None None None 2020-07-23 07:04:39 UTC

Description Guilherme de Almeida Suckevicz 2020-02-11 14:33:30 UTC
A flaw was found in Soteria before 1.0.1 in a way that multiple requests occurring concurrently there is the possibility of being handled using the identity from another request.

Upstream fix:

https://github.com/wildfly-security/soteria/commit/c2479f8c39d7d661341fdcaff7f5e97c5eea1a54

Comment 15 Jonathan Christison 2020-03-11 13:58:24 UTC
This vulnerability is out of security support scope for the following product:
 * SOA Platform 5

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 16 errata-xmlrpc 2020-05-11 20:10:51 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 6

Via RHSA-2020:2058 https://access.redhat.com/errata/RHSA-2020:2058

Comment 17 errata-xmlrpc 2020-05-11 20:13:54 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 7

Via RHSA-2020:2059 https://access.redhat.com/errata/RHSA-2020:2059

Comment 18 errata-xmlrpc 2020-05-11 20:16:51 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 8

Via RHSA-2020:2060 https://access.redhat.com/errata/RHSA-2020:2060

Comment 19 errata-xmlrpc 2020-05-11 20:20:01 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2020:2061 https://access.redhat.com/errata/RHSA-2020:2061

Comment 20 Product Security DevOps Team 2020-05-12 10:32:45 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-1732

Comment 21 errata-xmlrpc 2020-05-28 15:59:58 UTC
This issue has been addressed in the following products:

  EAP-CD 19 Tech Preview

Via RHSA-2020:2333 https://access.redhat.com/errata/RHSA-2020:2333

Comment 22 errata-xmlrpc 2020-07-23 07:04:35 UTC
This issue has been addressed in the following products:

  Red Hat Openshift Application Runtimes

Via RHSA-2020:2905 https://access.redhat.com/errata/RHSA-2020:2905


Note You need to log in before you can comment on or make changes to this bug.