Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-6236
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Eap: oidc app attempting to access the second tenant, the user should be prompted to log
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in Red Hat Enterprise Application Platform 8. When an OIDC app that serves multiple tenants attempts to access the second tenant, it should prompt the user to log in again since the second tenant is secured with a different OIDC configuration. The underlying issue is in OidcSessionTokenStore when determining if a cached token should be used or not. This logic needs to be updated to take into account the new "provider-url" option in addition to the "realm" option. EAP-7 does not provide the vulnerable provider-url configuration option in its OIDC implementation and is not affected by this flaw.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对数据真实性的验证不充分
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat JBoss Enterprise Application Platform 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat JBoss Enterprise Application Platform(EAP)是美国红帽(Red Hat)公司的一套开源的、基于J2EE的中间件平台。该平台主要用于构建、部署和托管Java应用程序与服务。 Red Hat JBoss Enterprise Application Platform(EAP)存在数据伪造问题漏洞,该漏洞源于OidcSessionTokenStore中没有确定是否应使用缓存令牌。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Red HatRed Hat JBoss Enterprise Application Platform 8-cpe:/a:redhat:jboss_enterprise_application_platform:8.0
Red HatRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 0:4.0.1-1.Final_redhat_00001.1.el8eap ~ * cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Red HatRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 0:2.2.4-2.SP01_redhat_00001.1.el8eap ~ * cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Red HatRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 9 0:4.0.1-1.Final_redhat_00001.1.el9eap ~ * cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Red HatRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 9 0:2.2.4-2.SP01_redhat_00001.1.el9eap ~ * cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Red HatRed Hat JBoss Enterprise Application Platform 7-cpe:/a:redhat:jboss_enterprise_application_platform:7
Red HatRed Hat JBoss Enterprise Application Platform Expansion Pack-cpe:/a:redhat:jbosseapxp
II. Public POCs for CVE-2023-6236
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-6236
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-6236

No comments yet


Leave a comment