Identity Cloud customers
If you have integrated Agents with Identity Cloud, you should secure your Web or Java Agents as recommended in this security advisory.
A security vulnerability has been discovered in supported versions of Web and Java Agents when using specific configurations. This vulnerability affects versions: Web Agent 184.108.40.206 - 5.9.0, and Java Agent 5.7.1, 5.8.0, 5.8.1 and 5.9.0. It could be present in older unsupported versions.
The maximum severity of issues in this advisory is Medium.
The advice is to upgrade. In some cases, a workaround is given, which may be suitable, but an upgrade to the latest version is the recommended approach.
Details about this vulnerability are deliberately kept to a minimum to protect your deployments and prevent someone trying to exploit them in the field. Please do not ask for steps to reproduce for the same reasons.
Web Agent: 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 5.7.0, 5.7.1, 5.8.0, 5.8.1, 5.8.2, 188.8.131.52, 5.9.0
Java Agent: 5.7.1, 5.8.0, 5.8.1, 5.8.2, 184.108.40.206, 5.9.0
|Fixed versions||Web Agent 5.9.1, Java Agent 5.9.1|
|Component||Web Agent, Java Agent|
Using the Accept SSO Token mode or Accept SSO token cookie (deprecated) in the Web Agent, or the non-default Enable SSO Token Acceptance mode in the Java Agent, the Agent does not correctly invalidate the SSO session with Identity Cloud or AM. For Web Agents, Disable Logout Redirection must also be set to true.
Upgrade to a fixed version.
The following table tracks changes to the security advisory:
|August 18, 2022||No changes to content - just corrected Backstage link|
|February 10, 2022||Fixed broken upgrade documentation link|
|January 24, 2022||Initial release|