CVE-2020-14341

The "Test Connection" available in v7.x of the Red Hat Single Sign On application console can permit an authorized user to cause SMTP connections to be attempted to arbitrary hosts and ports of the user's choosing, and originating from the RHSSO installation. By observing differences in the timings of these scans, an attacker may glean information about hosts and ports which they do not have access to scan directly.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1860138 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1860138 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:03

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1860138 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1860138 - Issue Tracking, Vendor Advisory

Information

Published : 2021-01-12 15:15

Updated : 2024-11-21 05:03


NVD link : CVE-2020-14341

Mitre link : CVE-2020-14341

CVE.ORG link : CVE-2020-14341


JSON object : View

Products Affected

redhat

  • single_sign-on
CWE
CWE-385

Covert Timing Channel