CVE-2020-1732
Summary
| CVE | CVE-2020-1732 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-04 17:15:00 UTC |
| Updated | 2023-11-07 03:19:00 UTC |
| Description | A flaw was found in Soteria before 1.0.1, in a way that multiple requests occurring concurrently causing security identity corruption across concurrent threads when using EE Security with WildFly Elytron which can lead to the possibility of being handled using the identity from another request. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Redhat | Jboss Enterprise Application Platform | 7.0.0 | All | All | All |
| Application | Redhat | Jboss Enterprise Application Platform | 7.0.0 | All | All | All |
| Application | Redhat | Jboss Enterprise Application Platform Continuous Delivery | - | All | All | All |
| Application | Redhat | Jboss Enterprise Application Platform Continuous Delivery | - | All | All | All |
| Application | Redhat | Openshift Application Runtimes | - | All | All | All |
| Application | Redhat | Openshift Application Runtimes | - | All | All | All |
| Application | Redhat | Soteria | All | All | All | All |
| Application | Redhat | Soteria | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 1801726 – (CVE-2020-1732) CVE-2020-1732 Soteria: security identity corruption across concurrent threads | CONFIRM | bugzilla.redhat.com | Issue Tracking, Patch, Vendor Advisory |
| Merge pull request #1 from darranl/CVE-2020-1732 · wildfly-security/soteria@c2479f8 · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.