CVE-2020-14341

The "Test Connection" available in v7.x of the Red Hat Single Sign On application console can permit an authorized user to cause SMTP connections to be attempted to arbitrary hosts and ports of the user's choosing, and originating from the RHSSO installation. By observing differences in the timings of these scans, an attacker may glean information about hosts and ports which they do not have access to scan directly.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1860138 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*

History

19 Jan 2021, 14:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 2.7
CPE cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1860138 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1860138 - Issue Tracking, Vendor Advisory

12 Jan 2021, 15:38

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-12 15:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-14341

Mitre link : CVE-2020-14341

CVE.ORG link : CVE-2020-14341


JSON object : View

Products Affected

redhat

  • single_sign-on
CWE
CWE-385

Covert Timing Channel