ID

VAR-202003-1771


CVE

CVE-2019-14887


TITLE

Wildfly Cryptographic strength vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2019-014948

DESCRIPTION

A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable. Wildfly There is a cryptographic strength vulnerability in.Information may be obtained and tampered with. Red Hat Wildfly is a lightweight open source application server based on JavaEE from American Red Hat (Red Hat) company. The vulnerability stems from the program's failure to implement the'enabled-protocols' setting configured by Wildfly. Attackers can use this vulnerability to obtain information spread on the network. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Installation instructions are available from the Fuse 7.9.0 product documentation page: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/ 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update Advisory ID: RHSA-2020:2512-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2020:2512 Issue date: 2020-06-10 CVE Names: CVE-2018-14371 CVE-2019-0205 CVE-2019-0210 CVE-2019-10172 CVE-2019-12423 CVE-2019-14887 CVE-2019-17573 CVE-2020-1695 CVE-2020-1729 CVE-2020-1745 CVE-2020-1757 CVE-2020-6950 CVE-2020-7226 CVE-2020-8840 CVE-2020-9546 CVE-2020-9547 CVE-2020-9548 CVE-2020-10688 CVE-2020-10719 ==================================================================== 1. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. See the Red Hat JBoss Enterprise Application Platform 7.3.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Security Fix(es): * cxf: reflected XSS in the services listing page (CVE-2019-17573) * cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423) * jackson-mapper-asl: XML external entity similar to CVE-2016-3720 (CVE-2019-10172) * undertow: servletPath in normalized incorrectly leading to dangerous application mapping which could result in security bypass (CVE-2020-1757) * jackson-databind: XML external entity similar to CVE-2016-3720 (CVE-2019-10172) * jackson-mapper-asl: XML external entity similar to CVE-2016-3720 (CVE-2019-10172) * resteasy-jaxrs: resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695) * cryptacular: excessive memory allocation during a decode operation (CVE-2020-7226) * smallrye-config: SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader (CVE-2020-1729) * resteasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack (CVE-2020-10688) * jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840) * undertow: invalid HTTP request with large chunk size (CVE-2020-10719) * jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546) * jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547) * jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548) * undertow: AJP File Read/Inclusion Vulnerability (CVE-2020-1745) * libthrift: thrift: Endless loop when feed with specific input data (CVE-2019-0205) * libthrift: thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol (CVE-2019-0210) * wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use (CVE-2019-14887) * jsf-impl: Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 (CVE-2020-6950) * jsf-impl: mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter (CVE-2018-14371) For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section. 4. Solution: Before applying this update, ensure all previously released errata relevant to your system have been applied. For details about how to apply this update, see: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1607709 - CVE-2018-14371 mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter 1715075 - CVE-2019-10172 jackson-mapper-asl: XML external entity similar to CVE-2016-3720 1730462 - CVE-2020-1695 resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class 1752770 - CVE-2020-1757 undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass 1764607 - CVE-2019-0210 thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol 1764612 - CVE-2019-0205 thrift: Endless loop when feed with specific input data 1772008 - CVE-2019-14887 wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use 1797006 - CVE-2019-12423 cxf: OpenId Connect token service does not properly validate the clientId 1797011 - CVE-2019-17573 cxf: reflected XSS in the services listing page 1801380 - CVE-2020-7226 cryptacular: excessive memory allocation during a decode operation 1802444 - CVE-2020-1729 SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader 1805006 - CVE-2020-6950 Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 1807305 - CVE-2020-1745 undertow: AJP File Read/Inclusion Vulnerability 1814974 - CVE-2020-10688 RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack 1816330 - CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking 1816332 - CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config 1816337 - CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap 1816340 - CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core 1828459 - CVE-2020-10719 undertow: invalid HTTP request with large chunk size 6. JIRA issues fixed (https://issues.jboss.org/): JBEAP-16114 - (7.3.z) Upgrade jboss-vfs to 3.2.15.Final JBEAP-18060 - [GSS](7.3.z) Upgrade weld from 3.1.2.Final-redhat-00001 to 3.1.4.Final-redhat-00001 JBEAP-18163 - (7.3.z) Upgrade HAL from 3.2.3.Final-redhat-00001 to 3.2.8.Final-redhat-00001 JBEAP-18221 - (7.3.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00010 to 2.5.5.SP12-redhat-00012 JBEAP-18240 - (7.3.z) Update the Chinese translations in WildFly Core JBEAP-18241 - (7.3.z) Update the Japanese translations in WildFly Core JBEAP-18273 - (7.3.z) Upgrade IronJacamar from 1.4.19.Final to 1.4.20.Final JBEAP-18277 - [GSS](7.3.z) Upgrade JBoss JSF API from 3.0.0.SP01-redhat-00001 to 3.0.0.SP02-redhat-00001 JBEAP-18288 - [GSS](7.3.z) Upgrade FasterXML from 2.10.0 to 2.10.3 JBEAP-18294 - (7.3.z) Upgrade JAXB from 2.3.1 to 2.3.3-b02 and com.sun.istack from 3.0.7 to 3.0.10 JBEAP-18302 - [GSS](7.3.z) Upgrade wildfly-http-client from 1.0.18 to 1.0.20 JBEAP-18315 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00005 to 2.9.0.redhat-00010 JBEAP-18346 - [GSS](7.3.z) Upgrade jakarta.el from 3.0.2.redhat-00001 to 3.0.3.redhat-00002 JBEAP-18352 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.16.Final-redhat-00001 to 5.0.18.Final-redhat-00001 JBEAP-18361 - [GSS](7.3.z) Upgrade Woodstox from 5.0.3 to 6.0.3 JBEAP-18367 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.15 to 5.3.16 JBEAP-18393 - [GSS](7.3.z) Update $JBOSS_HOME/docs/schema to show https schema URL instead of http JBEAP-18398 - Tracker bug for the EAP 7.3.1 release for RHEL-7 JBEAP-18409 - [GSS](7.3.z) Upgrade Infinispan from 9.4.16.Final-redhat-00002 to 9.4.18.Final-redhat-00001 JBEAP-18527 - (7.3.z) Upgrade WildFly Naming Client from 1.0.10.Final to 1.0.12.Final JBEAP-18528 - (7.3.z) Upgrade jboss-ejb-client from 4.0.27.Final to 4.0.31.Final-redhat-00001 JBEAP-18596 - [GSS](7.3.z) Upgrade JBoss Modules from 1.9.1 to 1.10.0 JBEAP-18598 - [GSS](7.3.z) Upgrade Bouncycastle from 1.60.0-redhat-00001 to 1.60.0-redhat-00002 JBEAP-18640 - [Runtimes] (7.3.x) Upgrade slf4j-jboss-logmanager from 1.0.3.GA.redhat-2 to 1.0.4.GA.redhat-00001 JBEAP-18653 - (7.3.z) Upgrade Apache CXF from 3.3.4.redhat-00001 to 3.3.5.redhat-00001 JBEAP-18706 - (7.3.z) Upgrade elytron-web from 1.6.0.Final to 1.6.1.Final JBEAP-18770 - Upgrade Jandex to 2.1.2.Final-redhat-00001 JBEAP-18775 - (7.3.z) Upgrade WildFly Core to 10.1.4.Final-redhat-00001 JBEAP-18788 - (7.3.x) Upgrade wss4j from 2.2.4.redhat-00001 to 2.2.5.redhat-00001 JBEAP-18790 - (7.3.z) Upgrade cryptacular from 1.2.0.redhat-1 to 1.2.4.redhat-00001 JBEAP-18818 - (7.3.z) Upgrade PicketBox from 5.0.3.Final-redhat-00005 to 5.0.3.Final-redhat-00006 JBEAP-18836 - [GSS](7.3.z) Upgrade Remoting JMX from 3.0.3 to 3.0.4 JBEAP-18850 - (7.3.z) Upgrade smallrye-config from 1.4.1 to 1.6.2 JBEAP-18870 - Upgrade WildFly Common to 1.5.2.Final.redhat-00002 JBEAP-18875 - Upgrade MicroProfile Metrics API to 2.3 and smallrye-metrics to 2.4.0 JBEAP-18876 - Upgrade Smallrye Health to 2.2.0 and MP Health API to 2.2 JBEAP-18877 - (7.3.z) Upgrade Jaeger client to 0.34.3 JBEAP-18878 - Upgrade Smallrye Opentracing to 1.3.4 and MP Opentracing to 1.3.3 JBEAP-18879 - (7.3.z) Upgrade MicroProfile Config 1.4 JBEAP-18929 - (7.3.z) Upgrade WildFly Elytron from 1.10.5.Final-redhat-00001 to 1.10.6.Final JBEAP-18990 - (7.3.z) Upgrade jasypt from 1.9.2 to 1.9.3-redhat-00001 JBEAP-18991 - (7.3.z) Upgrade opensaml from 3.3.0.redhat-1 to 3.3.1-redhat-00002 JBEAP-19035 - In Building Custom Layers, update pom.xml content for 7.3.1 JBEAP-19054 - Upgrade MP REST Client to 1.4.0.redhat-00004 JBEAP-19066 - Upgrade snakeyaml from 1.18.0.redhat-2 to 1.24.0.redhat-00001 JBEAP-19117 - [GSS](7.3.z) Upgrade org.jboss.genericjms from 2.0.2.Final-redhat-00001 to 2.0.4.Final-redhat-00001 JBEAP-19133 - [GSS](7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP08-redhat-00001 to 2.3.9.SP09-redhat-00001 JBEAP-19156 - (7.3.z) Upgrade RESTEasy from 3.11.1.Final.redhat-00001 to 3.11.2.Final.redhat-00001 JBEAP-19181 - (7.3.z) Upgrade WildFly Core to 10.1.5.Final-redhat-00001 JBEAP-19192 - (7.3.z) Update the Japanese translations JBEAP-19232 - (7.3.z) Upgrade WildFly Core from 10.1.5.Final-redhat-00001 to 10.1.7.Final-redhat-00001 JBEAP-19281 - (7.3.z) Upgrade undertow from 2.0.30.SP2-redhat-00001 to 2.0.30.SP3-redhat-00001 JBEAP-19456 - Upgrade wildfly-transaction-client to 1.1.11.Final 7. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 8. References: https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/ 9. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXuHcw9zjgjWX9erEAQh0/w//WCP+lyWNO4PYWG/1MPkiCmf9kc3lABZ/ zn5l0eEXpeV248b6iJ+xq4vgT3+7akvE4u0XOd0yV+dxoLXHGeNoNa5RDeRGFtEJ MbFhSdoOMYJDB14vBcZ6Zwc3lGQX8CrBjACI8mrGOpJIniP4H5dBB+Kb8QhXue82 FhdEppkBiTzMe0t1yWP6pIRgmtLcBGrPG8a5v1R/c8n/1ADIJiXaS8xQGI1x+z17 dJIwoQoF1QacJkDq5AqFHdN8cUqsiqsKNKDbm3B5JR6JEwlMSVGtlrMlxsXX2N9F QMB5LuOOUUfSsm2V1C1PCQ3bBPaXFNJk6upZjeRDQtyP0CxQHASrCgT+kkZAof6F SvflzocaHI/umyATKJkJua3WffJm1YXTGMQSGGgkvUdTxKz6RqAWGN5hOU+oced+ sCYp6gieKvwR4a+ubDfXLoyQ01g1/+f+g5EabKJkVKvsEEFxHPzL4w7cWA6ESG88 DnJ+fgf1tycBJD7Lw7IsmN1ckGWHtY+NzOV6btr+4UC4+qeC9D7b9n7UxSK2gGCE zAMEW88O3RYVB6QofV3Ysx/SHbQrdSfuVVGhzgSDHmYTLRjr31xXaQvFP4QAJS9a bD/W2ZVeN3/nSPduC18i1ZYzDmeP3+A+KS2S4/VWjMs5NSMNlF03RX2KDvegbi9J ULGZnlcYAXQ\xcfE3 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Summary: This is a security update for JBoss EAP Continuous Delivery 19. The References section of this erratum contains a download link (you must log in to download the update). The JBoss server process must be restarted for the update to take effect

Trust: 2.79

sources: NVD: CVE-2019-14887 // JVNDB: JVNDB-2019-014948 // CNVD: CNVD-2020-24683 // PACKETSTORM: 163798 // PACKETSTORM: 157741 // PACKETSTORM: 158048 // PACKETSTORM: 157859 // PACKETSTORM: 156692 // PACKETSTORM: 156883 // PACKETSTORM: 158038

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-24683

AFFECTED PRODUCTS

vendor:redhatmodel:wildflyscope:eqversion:7.2.0

Trust: 1.0

vendor:redhatmodel:jboss fusescope:eqversion:7.0.0

Trust: 1.0

vendor:redhatmodel:jboss data gridscope:eqversion:7.0.0

Trust: 1.0

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:7.0.0

Trust: 1.0

vendor:redhatmodel:openshift application runtimesscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:single sign-onscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:wildflyscope:eqversion:7.2.3

Trust: 1.0

vendor:redhatmodel:wildflyscope:eqversion:7.2.5

Trust: 1.0

vendor:red hatmodel:jboss data gridscope: - version: -

Trust: 0.8

vendor:red hatmodel:jboss enterprise application platformscope: - version: -

Trust: 0.8

vendor:red hatmodel:jboss fusescope: - version: -

Trust: 0.8

vendor:red hatmodel:openshift application runtimesscope: - version: -

Trust: 0.8

vendor:red hatmodel:single sign-onscope: - version: -

Trust: 0.8

vendor:red hatmodel:wildflyscope:eqversion:7.2.0.ga

Trust: 0.8

vendor:red hatmodel:wildflyscope:eqversion:7.2.3.ga

Trust: 0.8

vendor:red hatmodel:wildflyscope:eqversion:7.2.5.cr2

Trust: 0.8

vendor:hitachimodel:ops center common servicesscope:eqversion:(海外販売のみ)

Trust: 0.8

vendor:redmodel:hat wildflyscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-24683 // JVNDB: JVNDB-2019-014948 // NVD: CVE-2019-14887

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-14887
value: CRITICAL

Trust: 1.0

secalert@redhat.com: CVE-2019-14887
value: HIGH

Trust: 1.0

NVD: JVNDB-2019-014948
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-24683
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202003-782
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2019-14887
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2019-014948
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-24683
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-14887
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

secalert@redhat.com: CVE-2019-14887
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 5.2
version: 3.0

Trust: 1.0

NVD: JVNDB-2019-014948
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-24683 // JVNDB: JVNDB-2019-014948 // CNNVD: CNNVD-202003-782 // NVD: CVE-2019-14887 // NVD: CVE-2019-14887

PROBLEMTYPE DATA

problemtype:CWE-757

Trust: 1.0

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-326

Trust: 0.8

sources: JVNDB: JVNDB-2019-014948 // NVD: CVE-2019-14887

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 163798 // CNNVD: CNNVD-202003-782

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202003-782

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-014948

PATCH

title:hitachi-sec-2020-125url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2020-125/index.html

Trust: 0.8

title:Bug 1772008url:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14887

Trust: 0.8

title:hitachi-sec-2020-125url:https://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/hitachi-sec-2020-125/index.html

Trust: 0.8

title:Patch for Red Hat Wildfly encryption problem vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/215315

Trust: 0.6

title:Red Hat Wildfly Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111917

Trust: 0.6

sources: CNVD: CNVD-2020-24683 // JVNDB: JVNDB-2019-014948 // CNNVD: CNNVD-202003-782

EXTERNAL IDS

db:NVDid:CVE-2019-14887

Trust: 3.7

db:JVNDBid:JVNDB-2019-014948

Trust: 0.8

db:PACKETSTORMid:163798

Trust: 0.7

db:PACKETSTORMid:157741

Trust: 0.7

db:PACKETSTORMid:158048

Trust: 0.7

db:PACKETSTORMid:157859

Trust: 0.7

db:CNVDid:CNVD-2020-24683

Trust: 0.6

db:PACKETSTORMid:156885

Trust: 0.6

db:PACKETSTORMid:156701

Trust: 0.6

db:AUSCERTid:ESB-2020.1024

Trust: 0.6

db:AUSCERTid:ESB-2021.2731

Trust: 0.6

db:AUSCERTid:ESB-2020.0915

Trust: 0.6

db:AUSCERTid:ESB-2020.1052

Trust: 0.6

db:AUSCERTid:ESB-2020.1882

Trust: 0.6

db:AUSCERTid:ESB-2020.1766

Trust: 0.6

db:AUSCERTid:ESB-2020.2050

Trust: 0.6

db:AUSCERTid:ESB-2020.2042

Trust: 0.6

db:CNNVDid:CNNVD-202003-782

Trust: 0.6

db:PACKETSTORMid:156692

Trust: 0.1

db:PACKETSTORMid:156883

Trust: 0.1

db:PACKETSTORMid:158038

Trust: 0.1

sources: CNVD: CNVD-2020-24683 // JVNDB: JVNDB-2019-014948 // PACKETSTORM: 163798 // PACKETSTORM: 157741 // PACKETSTORM: 158048 // PACKETSTORM: 157859 // PACKETSTORM: 156692 // PACKETSTORM: 156883 // PACKETSTORM: 158038 // CNNVD: CNNVD-202003-782 // NVD: CVE-2019-14887

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-14887

Trust: 2.1

url:https://issues.redhat.com/browse/jbeap-17965

Trust: 1.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-14887

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20200327-0007/

Trust: 1.6

url:https://access.redhat.com/security/cve/cve-2019-14887

Trust: 1.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14887

Trust: 0.8

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-0210

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-0205

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-0210

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-0205

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1882/

Trust: 0.6

url:https://packetstormsecurity.com/files/157741/red-hat-security-advisory-2020-2067-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2050/

Trust: 0.6

url:https://packetstormsecurity.com/files/156701/red-hat-security-advisory-2020-0804-01.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/red-hat-jboss-enterprise-application-platform-three-vulnerabilities-31779

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0915/

Trust: 0.6

url:https://packetstormsecurity.com/files/158048/red-hat-security-advisory-2020-2512-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/156885/red-hat-security-advisory-2020-0962-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2042/

Trust: 0.6

url:https://packetstormsecurity.com/files/157859/red-hat-security-advisory-2020-2333-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2731

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1052/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1024/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1766/

Trust: 0.6

url:https://packetstormsecurity.com/files/163798/red-hat-security-advisory-2021-3140-01.html

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-10688

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-1695

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-10688

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-9547

Trust: 0.4

url:https://issues.jboss.org/):

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-1745

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-6950

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-10719

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-20445

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-20445

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-10719

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-1695

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9546

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-10086

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-7238

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9548

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-1729

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-10086

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8840

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-17573

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-1745

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-17573

Trust: 0.3

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

Trust: 0.3

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-12423

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-12423

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-16869

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-16869

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-16335

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-11112

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-11113

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-10968

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-16943

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-10672

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20330

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-12400

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-20330

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-12419

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17531

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-16335

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17531

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14540

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17267

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-16942

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14892

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-16943

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-10969

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-12419

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17267

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14893

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-11111

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-16942

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14893

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14888

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-12400

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14892

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14540

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14888

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-10172

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9547

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-7226

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-10172

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9548

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-1757

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9546

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8840

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-1729

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-7226

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6950

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14371

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-14371

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-1757

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-20444

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20444

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-13936

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1925

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-1935

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-17510

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13956

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14040

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14338

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13920

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13954

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18640

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14040

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3140

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13920

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-5410

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13934

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27216

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13934

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13935

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28165

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9484

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14297

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5645

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14338

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10693

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10714

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12402

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12402

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-1925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13954

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25640

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25638

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-5645

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14340

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.fuse&version=7.9.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14297

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-17510

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-11996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13956

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27807

Trust: 0.1

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14340

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25633

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18640

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26945

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25644

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1935

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13936

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-17518

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27906

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-5421

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-1938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28052

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10693

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-17518

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13935

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10714

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3875

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14832

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10201

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9515

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11619

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2067

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3875

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12406

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9514

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9511

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9514

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10673

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10219

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14832

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10199

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=catrhoar.thorntail&version=2.5.1

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9511

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12406

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10201

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11620

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9512

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10199

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9512

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10219

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14820

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14820

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2512

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10174

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2333

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/jboss_enterprise_application_platform_continuous_delivery/19/

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product\xeap-cd&downloadtype=securitypatches&version

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10672

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-11111

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10174

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10968

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10969

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1732

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7238

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:0806

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=7.3

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:0961

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2515

Trust: 0.1

sources: JVNDB: JVNDB-2019-014948 // PACKETSTORM: 163798 // PACKETSTORM: 157741 // PACKETSTORM: 158048 // PACKETSTORM: 157859 // PACKETSTORM: 156692 // PACKETSTORM: 156883 // PACKETSTORM: 158038 // CNNVD: CNNVD-202003-782 // NVD: CVE-2019-14887

CREDITS

Red Hat

Trust: 1.3

sources: PACKETSTORM: 163798 // PACKETSTORM: 157741 // PACKETSTORM: 158048 // PACKETSTORM: 157859 // PACKETSTORM: 156692 // PACKETSTORM: 156883 // PACKETSTORM: 158038 // CNNVD: CNNVD-202003-782

SOURCES

db:CNVDid:CNVD-2020-24683
db:JVNDBid:JVNDB-2019-014948
db:PACKETSTORMid:163798
db:PACKETSTORMid:157741
db:PACKETSTORMid:158048
db:PACKETSTORMid:157859
db:PACKETSTORMid:156692
db:PACKETSTORMid:156883
db:PACKETSTORMid:158038
db:CNNVDid:CNNVD-202003-782
db:NVDid:CVE-2019-14887

LAST UPDATE DATE

2024-09-18T22:04:28.621000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-24683date:2020-04-24T00:00:00
db:JVNDBid:JVNDB-2019-014948date:2020-08-24T00:00:00
db:CNNVDid:CNNVD-202003-782date:2021-11-03T00:00:00
db:NVDid:CVE-2019-14887date:2021-11-02T18:10:07.537

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-24683date:2020-04-24T00:00:00
db:JVNDBid:JVNDB-2019-014948date:2020-03-31T00:00:00
db:PACKETSTORMid:163798date:2021-08-12T15:42:56
db:PACKETSTORMid:157741date:2020-05-18T16:42:53
db:PACKETSTORMid:158048date:2020-06-11T16:36:20
db:PACKETSTORMid:157859date:2020-05-28T16:22:46
db:PACKETSTORMid:156692date:2020-03-12T19:49:17
db:PACKETSTORMid:156883date:2020-03-24T15:09:31
db:PACKETSTORMid:158038date:2020-06-11T16:34:25
db:CNNVDid:CNNVD-202003-782date:2020-03-12T00:00:00
db:NVDid:CVE-2019-14887date:2020-03-16T15:15:12.130