
CVE-2022-4132 – Memory leak on tls connections
https://notcve.org/view.php?id=CVE-2022-4132
04 Oct 2023 — A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page). Se encontró una falla en JSS. Una pérdida de memoria en JSS requiere una configuración no estándar, pero es un vector DoS de bajo esfuerzo si se configura de esa manera (presionando repetidamente la página de inicio de sesión). • https://access.redhat.com/security/cve/CVE-2022-4132 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2022-2414 – pki-core: access to external entities when parsing XML can lead to XXE
https://notcve.org/view.php?id=CVE-2022-2414
29 Jul 2022 — Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests. El acceso a entidades externas cuando son analizados documentos XML puede conllevar a ataques de tipo XML external entity (XXE). Este fallo permite a un atacante remoto recuperar potencialmente el contenido de archivos arbitrarios mediante el envío de peticiones HTTP especial... • https://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2021-4213 – JSS: memory leak in TLS connection leads to OOM
https://notcve.org/view.php?id=CVE-2021-4213
11 May 2022 — A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service. Se ha encontrado un fallo en JSS, que no libera apropiadamente toda la memoria. Con el tiempo, la memoria desperdiciada es acumulada en la memoria del servidor, saturando la RAM del mismo. • https://access.redhat.com/security/cve/CVE-2021-4213 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2021-3551 – pki-server: Dogtag installer "pkispawn" logs admin credentials into a world-readable log file
https://notcve.org/view.php?id=CVE-2021-3551
03 Jun 2021 — A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality. Se ha encontrado un fallo en el servidor PKI, donde el comando spkispawn, cuando es ejecutado en modo de depuración, almacena las credenciales de administrador en el ... • https://bugzilla.redhat.com/show_bug.cgi?id=1959971 • CWE-312: Cleartext Storage of Sensitive Information •

CVE-2020-25715 – pki-core: XSS in the certificate search results
https://notcve.org/view.php?id=CVE-2020-25715
15 Mar 2021 — A flaw was found in pki-core 10.9.0. A specially crafted POST request can be used to reflect a DOM-based cross-site scripting (XSS) attack to inject code into the search query form which can get automatically executed. The highest threat from this vulnerability is to data integrity. Se encontró un fallo en pki-core versión 10.9.0. Puede ser usado una petición POST especialmente diseñada para reflejar un ataque de tipo cross-site scripting (XSS) basado en DOM para inyectar código en el formulario de con... • https://bugzilla.redhat.com/show_bug.cgi?id=1891016 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-20179 – pki-core: Unprivileged users can renew any certificate
https://notcve.org/view.php?id=CVE-2021-20179
15 Mar 2021 — A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity. Se encontró un fallo en pki-core. Un atacante que haya comprometido con éxito una clave podría usar este fallo para renovar el certificado correspondiente una y otra vez, siempre que no se revoque explícitamente. • https://bugzilla.redhat.com/show_bug.cgi?id=1914379 • CWE-863: Incorrect Authorization •

CVE-2020-1721 – pki-core: KRA vulnerable to reflected XSS via the getPk12 page
https://notcve.org/view.php?id=CVE-2020-1721
04 Nov 2020 — A flaw was found in the Key Recovery Authority (KRA) Agent Service in pki-core 10.10.5 where it did not properly sanitize the recovery ID during a key recovery request, enabling a reflected cross-site scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code. Se detectó un fallo en el Agent Service de Key Recovery Authority (KRA) en pki-core versión 10.10.5, donde no sanea apropiadamente el ID de recuperación durante una petición de recup... • https://bugzilla.redhat.com/show_bug.cgi?id=1777579 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-15720 – pki: Dogtag's python client does not validate certificates
https://notcve.org/view.php?id=CVE-2020-15720
14 Jul 2020 — In Dogtag PKI through 10.8.3, the pki.client.PKIConnection class did not enable python-requests certificate validation. Since the verify parameter was hard-coded in all request functions, it was not possible to override the setting. As a result, tools making use of this class, such as the pki-server command, may have been vulnerable to Person-in-the-Middle attacks in certain non-localhost use cases. This is fixed in 10.9.0-b1. En Dogtag PKI versiones hasta 10.8.3, la clase pki.client.PKIConnection no habili... • https://bugzilla.redhat.com/show_bug.cgi?id=1855273 • CWE-295: Improper Certificate Validation •

CVE-2019-10180 – pki-core: unsanitized token parameters in TPS resulting in stored XSS
https://notcve.org/view.php?id=CVE-2019-10180
31 Mar 2020 — A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code. Se detectó una vulnerabilidad en todas las versiones de pki-core 10.x.x, donde el Token Processing Service (TPS) no sanea ap... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10180 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-1696 – pki-core: Stored XSS in TPS profile creation
https://notcve.org/view.php?id=CVE-2020-1696
20 Mar 2020 — A flaw was found in the all pki-core 10.x.x versions, where Token Processing Service (TPS) where it did not properly sanitize Profile IDs, enabling a Stored Cross-Site Scripting (XSS) vulnerability when the profile ID is printed. An attacker with sufficient permissions could trick an authenticated victim into executing a specially crafted Javascript code. Se detectó un fallo en todas las versiones de pki-core 10.x.x, donde Token Processing Service (TPS) no saneaba apropiadamente los ID de perfil, permitiend... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1696 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •