CVE-2021-20324

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

07 Nov 2023, 03:29

Type Values Removed Values Added
Summary ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none

27 Mar 2023, 21:15

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:wildfly_elytron:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
Summary A flaw was found in WildFly Elytron. A variation to the use of a session fixation exploit when using Undertow was found despite Undertow switching the session ID after authentication. ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
References
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1830206', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1830206', 'tags': ['Issue Tracking', 'Vendor Advisory'], 'refsource': 'MISC'}
CVSS v2 : 5.8
v3 : 5.4
v2 : unknown
v3 : unknown
CWE CWE-384

26 Apr 2022, 17:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.8
v3 : 5.4
CWE CWE-384
CPE cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:wildfly_elytron:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1830206 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1830206 - Issue Tracking, Vendor Advisory
First Time Redhat jboss Enterprise Application Platform
Redhat
Redhat process Automation
Redhat descision Manager
Redhat codeready Studio
Redhat single Sign-on
Redhat wildfly Elytron

18 Apr 2022, 17:45

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-18 17:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-20324

Mitre link : CVE-2021-20324

CVE.ORG link : CVE-2021-20324


JSON object : View

Products Affected

No product.

CWE

No CWE.