The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Apache CXF: Cross Site Scripting via Endpoint Names

Synthesis of the vulnerability 

An attacker can trigger a Cross Site Scripting via Endpoint Names of Apache CXF, in order to run JavaScript code in the context of the web site.
Impacted systems: QRadar SIEM, WebSphere AS Liberty, Oracle Communications, JBoss EAP by Red Hat, Red Hat SSO.
Severity of this alert: 2/4.
Creation date: 19/03/2020.
Références of this alert: 6100132, 6344071, cpujul2020, CVE-2019-17573, RHSA-2020:2058-01, RHSA-2020:2059-01, RHSA-2020:2060-01, RHSA-2020:2061-01, RHSA-2020:2106-01, RHSA-2020:2107-01, RHSA-2020:2108-01, RHSA-2020:2112-01, RHSA-2020:2113-01, RHSA-2020:2511-01, RHSA-2020:2512-01, RHSA-2020:2513-01, RHSA-2020:2515-01, VIGILANCE-VUL-31835.

Description of the vulnerability 

An attacker can trigger a Cross Site Scripting via Endpoint Names of Apache CXF, in order to run JavaScript code in the context of the web site.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability impacts software or systems such as QRadar SIEM, WebSphere AS Liberty, Oracle Communications, JBoss EAP by Red Hat, Red Hat SSO.

Our Vigil@nce team determined that the severity of this security announce is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer vulnerability note.

Solutions for this threat 

IBM QRadar SIEM: patch for Jetty, ActiveMQ, CXF.
A patch is indicated in information sources.

Oracle Communications: CPU of July 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2681987.1
  https://support.oracle.com/rs?type=doc&id=2682459.1
  https://support.oracle.com/rs?type=doc&id=2682014.1
  https://support.oracle.com/rs?type=doc&id=2683787.1
  https://support.oracle.com/rs?type=doc&id=2683788.1
  https://support.oracle.com/rs?type=doc&id=2683789.1
  https://support.oracle.com/rs?type=doc&id=2682045.1
  https://support.oracle.com/rs?type=doc&id=2683831.1
  https://support.oracle.com/rs?type=doc&id=2682010.1
  https://support.oracle.com/rs?type=doc&id=2683832.1
  https://support.oracle.com/rs?type=doc&id=2682500.1
  https://support.oracle.com/rs?type=doc&id=2683241.1
  https://support.oracle.com/rs?type=doc&id=2682011.1
  https://support.oracle.com/rs?type=doc&id=2683840.1
  https://support.oracle.com/rs?type=doc&id=2682018.1
  https://support.oracle.com/rs?type=doc&id=2683841.1
  https://support.oracle.com/rs?type=doc&id=2683842.1
  https://support.oracle.com/rs?type=doc&id=2683843.1
  https://support.oracle.com/rs?type=doc&id=2683845.1

Red Hat JBoss EAP: version 7.3.1.
The version 7.3.1 is fixed:
  https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

Red Hat JBoss Enterprise Application Platform: version 7.2.8.
The version 7.2.8 is fixed.

Red Hat Single Sign-On: version 7.3.8.
The version 7.3.8 is fixed.

WebSphere Application Server Liberty: patch for Apache CXF.
A patch is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a cybersecurity watch. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.