Process Automation Manager Red Hat Process Automation Manager

Do you want an email whenever new security vulnerabilities are reported in Red Hat Process Automation Manager?

Recent Red Hat Process Automation Manager Security Advisories

Advisory Title Published
RHSA-2024:1353 (RHSA-2024:1353) Important: Red Hat Process Automation Manager 7.13.5 security update March 18, 2024
RHSA-2023:7335 (RHSA-2023:7335) Important: Updated Red Hat Process Automation Manager 7.13.4 SP2 Images November 16, 2023
RHSA-2023:6112 (RHSA-2023:6112) Important: Red Hat Process Automation Manager 7.13.4 security one-off update October 25, 2023
RHSA-2023:6107 (RHSA-2023:6107) Important: Updated Kogito for Red Hat Process Automation Manager 7.13.4 SP1 Images October 25, 2023
RHSA-2023:4983 (RHSA-2023:4983) Important: Red Hat Process Automation Manager 7.13.4 security update September 5, 2023
RHSA-2023:2135 (RHSA-2023:2135) Important: Red Hat Process Automation Manager 7.13.3 security update May 4, 2023
RHSA-2023:1334 (RHSA-2023:1334) Critical: Red Hat Process Automation Manager 7.13.2 security update March 20, 2023
RHSA-2022:6813 (RHSA-2022:6813) Important: Red Hat Process Automation Manager 7.13.1 security update October 5, 2022
RHSA-2022:5903 (RHSA-2022:5903) Moderate: Red Hat Process Automation Manager 7.13.0 security update August 4, 2022
RHSA-2022:1378 (RHSA-2022:1378) Low: Red Hat Process Automation Manager 7.12.1 security update April 14, 2022

By the Year

In 2024 there have been 0 vulnerabilities in Red Hat Process Automation Manager . Last year Process Automation Manager had 1 security vulnerability published. Right now, Process Automation Manager is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 8.10
2022 2 9.00
2021 0 0.00
2020 1 6.50
2019 0 0.00
2018 0 0.00

It may take a day or so for new Process Automation Manager vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Process Automation Manager Security Vulnerabilities

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests

CVE-2023-4853 8.1 - High - September 20, 2023

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.

AuthZ

XML external entity injection(XXE) is a vulnerability that allows an attacker to interfere with an application's processing of XML data

CVE-2022-2458 8.2 - High - August 10, 2022

XML external entity injection(XXE) is a vulnerability that allows an attacker to interfere with an application's processing of XML data. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. The software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. Here, XML external entity injection lead to External Service interaction & Internal file read in Business Central and also Kie-Server APIs.

XXE

A flaw was found in Red Hat Process Automation Manager 7 where an attacker can benefit

CVE-2022-2457 9.8 - Critical - August 10, 2022

A flaw was found in Red Hat Process Automation Manager 7 where an attacker can benefit from a brute force attack against Administration Console as the application does not limit the number of unsuccessful login attempts.

Improper Restriction of Excessive Authentication Attempts

A vulnerability was found in business-central

CVE-2019-14886 6.5 - Medium - March 05, 2020

A vulnerability was found in business-central, as shipped in rhdm-7.5.1 and rhpam-7.5.1, where encoded passwords are stored in errai_security_context. The encoding used for storing the passwords is Base64, not an encryption algorithm, and any recovery of these passwords could lead to user passwords being exposed.

Cleartext Storage of Sensitive Information

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat Process Automation Manager or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe