Action not permitted
Modal body text goes here.
CVE-2013-2160
Vulnerability from cvelistv5
Published
2013-08-19 23:00
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:40.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" }, { "name": "RHSA-2013:1437", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jira.codehaus.org/browse/WSTX-287" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jira.codehaus.org/browse/WSTX-285" }, { "name": "RHSA-2013:1028", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T11:07:07", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" }, { "name": "RHSA-2013:1437", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jira.codehaus.org/browse/WSTX-287" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jira.codehaus.org/browse/WSTX-285" }, { "name": "RHSA-2013:1028", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2160", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "refsource": "CONFIRM", "url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" }, { "name": "RHSA-2013:1437", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html" }, { "name": "http://jira.codehaus.org/browse/WSTX-287", "refsource": "MISC", "url": "http://jira.codehaus.org/browse/WSTX-287" }, { "name": "http://jira.codehaus.org/browse/WSTX-285", "refsource": "MISC", "url": "http://jira.codehaus.org/browse/WSTX-285" }, { "name": "RHSA-2013:1028", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=929197", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2160", "datePublished": "2013-08-19T23:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:40.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-2160\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-08-19T23:55:08.477\",\"lastModified\":\"2023-11-07T02:14:57.147\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.\"},{\"lang\":\"es\",\"value\":\"El analizador de secuencias XML en Apache CXF versiones 2.5.x anteriores a 2.5.10, versiones 2.6.x anteriores a 2.6.7 y versiones 2.7.x anteriores a 2.7.4, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU y memoria) por medio de XML dise\u00f1ado con un gran n\u00famero de (1) elementos, (2) atributos, (3) construcciones anidadas y posiblemente otros vectores.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24246B2-915D-494B-9863-CF0B662BE54D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6915B2EC-AA31-44B5-A5F3-3EE1FDD0ABC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90280778-F7D6-49E2-9C7F-9F5F58137FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962F2A85-4731-450B-986B-E1A79986F143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49F920D4-1102-4D30-ABD8-F47342DA735A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84FD5387-E292-458A-9E8C-85C082461594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D523A5E-24A7-43D7-AE54-02EBF13537D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC774B3E-D7E4-4FC1-AB09-392EC16F0F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A1ECB5D-F146-4E4A-BB9A-C96EB5C863A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1138E4D2-7CB6-42C0-91A8-D6C2BDC9F764\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4FC7D67-80A3-43F6-8D46-F13F37A017CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F069B04-FDA0-41C3-BCAC-C74A310078B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED986C6-39C6-4F2A-86F7-C2CE9BBE25B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5CF2CB-B33D-4C51-84C3-8C10E3E26193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BACD3A8-2FEE-4CB7-9229-06679D6D8150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0835933D-4EA4-4C95-8964-984087537268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070739FD-9411-4BDB-A96F-3BC4A676A40F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C629A8A7-BFB3-453B-9BCA-3873512410FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"346AF04F-E0C5-45EE-A421-2E1A4E2B57FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29777E8F-4DB3-4E9E-9FF4-D13749A7C0AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA20A9DA-2BEB-4699-A8D4-A90EA036693F\"}]}]}],\"references\":[{\"url\":\"http://jira.codehaus.org/browse/WSTX-285\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://jira.codehaus.org/browse/WSTX-287\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1028.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1437.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=929197\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"}]}}" } }
gsd-2013-2160
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-2160", "description": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.", "id": "GSD-2013-2160", "references": [ "https://access.redhat.com/errata/RHSA-2013:1437", "https://access.redhat.com/errata/RHSA-2013:1185", "https://access.redhat.com/errata/RHSA-2013:1028", "https://advisories.mageia.org/CVE-2013-2160.html", "https://packetstormsecurity.com/files/cve/CVE-2013-2160", "https://www.suse.com/security/cve/CVE-2013-2160.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-2160" ], "details": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.", "id": "GSD-2013-2160", "modified": "2023-12-13T01:22:17.354054Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2160", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "refsource": "CONFIRM", "url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" }, { "name": "RHSA-2013:1437", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html" }, { "name": "http://jira.codehaus.org/browse/WSTX-287", "refsource": "MISC", "url": "http://jira.codehaus.org/browse/WSTX-287" }, { "name": "http://jira.codehaus.org/browse/WSTX-285", "refsource": "MISC", "url": "http://jira.codehaus.org/browse/WSTX-285" }, { "name": "RHSA-2013:1028", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=929197", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[2.5,2.5.9],[2.6,2.6.6],[2.7,2.7.3]", "affected_versions": "All versions starting from 2.5 up to 2.5.9, all versions starting from 2.6 up to 2.6.6, all versions starting from 2.7 up to 2.7.3", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-399", "CWE-937" ], "date": "2013-10-30", "description": "The streaming XML parser in Apache CXF allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.", "fixed_versions": [ "2.5.10", "2.6.6-jbossorg-1", "2.7.4" ], "identifier": "CVE-2013-2160", "identifiers": [ "CVE-2013-2160" ], "not_impacted": "All versions before 2.5, all versions after 2.5.9 before 2.6, all versions after 2.6.6 before 2.7, all versions after 2.7.3", "package_slug": "maven/org.apache.cxf/apache-cxf", "pubdate": "2013-08-19", "solution": "Upgrade to versions 2.5.10, 2.6.6-jbossorg-1, 2.7.4 or above.", "title": "Uncontrolled Resource Consumption", "urls": [ "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2160" ], "uuid": "8056f8e3-e39b-4a36-a56a-961a345281fe" }, { "affected_range": "[2.5-alpha0,2.5.9],[2.6-alpha0,2.6.6],[2.7-alpha0,2.7.3]", "affected_versions": "All versions starting from 2.5-alpha0 up to 2.5.9, all versions starting from 2.6-alpha0 up to 2.6.6, all versions starting from 2.7-alpha0 up to 2.7.3", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-399", "CWE-937" ], "date": "2013-10-30", "description": "The streaming XML parser in this package allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of elements, attributes, nested constructs, and possibly other vectors.", "fixed_versions": [ "2.5.10", "2.6.7", "2.7.4" ], "identifier": "CVE-2013-2160", "identifiers": [ "CVE-2013-2160" ], "not_impacted": "All versions before 2.5-alpha0, all versions after 2.5.9 before 2.6-alpha0, all versions after 2.6.6 before 2.7-alpha0, all versions after 2.7.3", "package_slug": "maven/org.apache.cxf/cxf-api", "pubdate": "2013-08-19", "solution": "Upgrade to versions 2.5.10, 2.6.7, 2.7.4 or above.", "title": "Denial of Service Attacks on Apache CXF", "urls": [ "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2160" ], "uuid": "ffa496d2-7c75-495e-95ca-428693555a7d" }, { "affected_range": "[2.5-alpha0,2.5.9],[2.6-alpha0,2.6.6],[2.7-alpha0,2.7.3]", "affected_versions": "All versions starting from 2.5-alpha0 up to 2.5.9, all versions starting from 2.6-alpha0 up to 2.6.6, all versions starting from 2.7-alpha0 up to 2.7.3", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-399", "CWE-937" ], "date": "2013-10-30", "description": "The streaming XML parser in this package remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of elements, attributes, nested constructs, and possibly other vectors.", "fixed_versions": [ "2.5.10", "2.6.7", "2.7.4" ], "identifier": "CVE-2013-2160", "identifiers": [ "CVE-2013-2160" ], "not_impacted": "All versions before 2.5-alpha0, all versions after 2.5.9 before 2.6-alpha0, all versions after 2.6.6 before 2.7-alpha0, all versions after 2.7.3", "package_slug": "maven/org.apache.cxf/cxf-parent", "pubdate": "2013-08-19", "solution": "Upgrade to versions 2.5.10, 2.6.7, 2.7.4 or above.", "title": "Denial of Service Attacks on Apache CXF", "urls": [ "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2160" ], "uuid": "0d023617-f77a-40de-8a71-4195c91e9a26" }, { "affected_range": "[2.5.0,2.5.10),[2.6.0,2.6.7),[2.7.0,2.7.4)", "affected_versions": "All versions starting from 2.5.0 before 2.5.10, all versions starting from 2.6.0 before 2.6.7, all versions starting from 2.7.0 before 2.7.4", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-399", "CWE-937" ], "date": "2022-07-08", "description": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.", "fixed_versions": [ "2.5.10", "2.6.7", "2.7.4" ], "identifier": "CVE-2013-2160", "identifiers": [ "GHSA-254q-rp36-v2m8", "CVE-2013-2160" ], "not_impacted": "All versions before 2.5.0, all versions starting from 2.5.10 before 2.6.0, all versions starting from 2.6.7 before 2.7.0, all versions starting from 2.7.4", "package_slug": "maven/org.apache.cxf/cxf-rt-frontend-jaxrs", "pubdate": "2022-05-13", "solution": "Upgrade to versions 2.5.10, 2.6.7, 2.7.4 or above.", "title": "Missing XML Validation in Apache CXF", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2013-2160", "https://bugzilla.redhat.com/show_bug.cgi?id=929197", "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E", "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E", "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E", "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E", "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E", "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E", "http://jira.codehaus.org/browse/WSTX-285", "http://jira.codehaus.org/browse/WSTX-287", "http://rhn.redhat.com/errata/RHSA-2013-1028.html", "http://rhn.redhat.com/errata/RHSA-2013-1437.html", "https://github.com/advisories/GHSA-254q-rp36-v2m8" ], "uuid": "fc211469-e3af-4c1b-a589-2796929d11ef" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2160" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "http://jira.codehaus.org/browse/WSTX-287", "refsource": "MISC", "tags": [ "Patch" ], "url": "http://jira.codehaus.org/browse/WSTX-287" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=929197", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "name": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" }, { "name": "RHSA-2013:1028", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html" }, { "name": "http://jira.codehaus.org/browse/WSTX-285", "refsource": "MISC", "tags": [ "Patch" ], "url": "http://jira.codehaus.org/browse/WSTX-285" }, { "name": "RHSA-2013:1437", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html" }, { "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2021-06-16T12:15Z", "publishedDate": "2013-08-19T23:55Z" } } }
rhsa-2013_1185
Vulnerability from csaf_redhat
Published
2013-08-29 23:22
Modified
2024-11-05 18:10
Summary
Red Hat Security Advisory: Red Hat JBoss Fuse 6.0.0 patch 2
Notes
Topic
Red Hat JBoss Fuse 6.0.0 patch 2, which fixes several security issues and
various bugs, is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Red Hat JBoss Fuse 6.0.0, based on Apache ServiceMix, provides an
integration platform.
Red Hat JBoss Fuse 6.0.0 patch 2 is an update to Red Hat JBoss Fuse 6.0.0
and includes bug fixes. Refer to the readme file included with the patch
files for information about these fixes.
The following security issues are also resolved with this update:
A flaw was found in the logging performed during deserialization of the
BrokerFactory class in Apache OpenJPA. A remote attacker able to supply a
serialized instance of the BrokerFactory class, which will be deserialized
on a server, could use this flaw to write an executable file to the
server's file system. (CVE-2013-1768)
A flaw in JRuby's JSON gem allowed remote attacks by creating different
types of malicious objects. For example, it could initiate a denial of
service attack through resource consumption by using a JSON document to
create arbitrary Ruby symbols, which were never garbage collected. It could
also be exploited to create internal objects which could allow a SQL
injection attack. (CVE-2013-0269)
It was discovered that JRuby's REXML library did not properly restrict XML
entity expansion. An attacker could use this flaw to cause a denial of
service by tricking a Ruby application using REXML to read text nodes from
specially-crafted XML content, which will result in REXML consuming large
amounts of system memory. (CVE-2013-1821)
Note: Red Hat JBoss Fuse 6.0.0 ships JRuby as part of the camel-ruby
component, which allows users to define Camel routes in Ruby. The default
use of JRuby in Red Hat JBoss Fuse 6.0.0 does not appear to expose either
CVE-2013-0269 or CVE-2013-1821. If the version of JRuby shipped with Red
Hat JBoss Fuse 6.0.0 was used to build a custom application, then these
flaws could be exposed.
Multiple denial of service flaws were found in the way the Apache CXF StAX
parser implementation processed certain XML files. If a web service
utilized the StAX parser, a remote attacker could provide a
specially-crafted XML file that, when processed, would lead to excessive
CPU and memory consumption. (CVE-2013-2160)
Red Hat would like to thank Ruby on Rails upstream for reporting
CVE-2013-0269, and Andreas Falkenberg of SEC Consult Deutschland GmbH, and
Christian Mainka, Juraj Somorovsky and Joerg Schwenk of Ruhr-University
Bochum for reporting CVE-2013-2160. Upstream acknowledges Thomas Hollstegge
of Zweitag and Ben Murphy as the original reporters of CVE-2013-0269.
All users of Red Hat JBoss Fuse 6.0 as provided from the Red Hat Customer
Portal are advised to apply this patch.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Fuse 6.0.0 patch 2, which fixes several security issues and\nvarious bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Fuse 6.0.0, based on Apache ServiceMix, provides an\nintegration platform.\n\nRed Hat JBoss Fuse 6.0.0 patch 2 is an update to Red Hat JBoss Fuse 6.0.0\nand includes bug fixes. Refer to the readme file included with the patch\nfiles for information about these fixes.\n\nThe following security issues are also resolved with this update:\n\nA flaw was found in the logging performed during deserialization of the\nBrokerFactory class in Apache OpenJPA. A remote attacker able to supply a\nserialized instance of the BrokerFactory class, which will be deserialized\non a server, could use this flaw to write an executable file to the\nserver\u0027s file system. (CVE-2013-1768)\n\nA flaw in JRuby\u0027s JSON gem allowed remote attacks by creating different\ntypes of malicious objects. For example, it could initiate a denial of\nservice attack through resource consumption by using a JSON document to\ncreate arbitrary Ruby symbols, which were never garbage collected. It could\nalso be exploited to create internal objects which could allow a SQL\ninjection attack. (CVE-2013-0269)\n\nIt was discovered that JRuby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nNote: Red Hat JBoss Fuse 6.0.0 ships JRuby as part of the camel-ruby\ncomponent, which allows users to define Camel routes in Ruby. The default\nuse of JRuby in Red Hat JBoss Fuse 6.0.0 does not appear to expose either\nCVE-2013-0269 or CVE-2013-1821. If the version of JRuby shipped with Red\nHat JBoss Fuse 6.0.0 was used to build a custom application, then these\nflaws could be exposed.\n\nMultiple denial of service flaws were found in the way the Apache CXF StAX\nparser implementation processed certain XML files. If a web service\nutilized the StAX parser, a remote attacker could provide a\nspecially-crafted XML file that, when processed, would lead to excessive\nCPU and memory consumption. (CVE-2013-2160)\n\nRed Hat would like to thank Ruby on Rails upstream for reporting\nCVE-2013-0269, and Andreas Falkenberg of SEC Consult Deutschland GmbH, and\nChristian Mainka, Juraj Somorovsky and Joerg Schwenk of Ruhr-University\nBochum for reporting CVE-2013-2160. Upstream acknowledges Thomas Hollstegge\nof Zweitag and Ben Murphy as the original reporters of CVE-2013-0269.\n\nAll users of Red Hat JBoss Fuse 6.0 as provided from the Red Hat Customer\nPortal are advised to apply this patch.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1185", "url": "https://access.redhat.com/errata/RHSA-2013:1185" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.0.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.0.0" }, { "category": "external", "summary": "909029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029" }, { "category": "external", "summary": "914716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716" }, { "category": "external", "summary": "929197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "category": "external", "summary": "984034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984034" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1185.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse 6.0.0 patch 2", "tracking": { "current_release_date": "2024-11-05T18:10:28+00:00", "generator": { "date": "2024-11-05T18:10:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2013:1185", "initial_release_date": "2013-08-29T23:22:00+00:00", "revision_history": [ { "date": "2013-08-29T23:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-08-29T23:27:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:10:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Fuse 6.0", "product": { "name": "Red Hat JBoss Fuse 6.0", "product_id": "Red Hat JBoss Fuse 6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.0.0" } } } ], "category": "product_family", "name": "Fuse Enterprise Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Thomas Hollstegge" ], "organization": "Zweitag", "summary": "Acknowledged by upstream." }, { "names": [ "Ben Murphy" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-0269", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2013-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "909029" } ], "notes": [ { "category": "description", "text": "The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka \"Unsafe Object Creation Vulnerability.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-json: Denial of Service and SQL Injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite tools ship RubyGem Json 1.4.6 which is earlier than affected 1.5.5 version however, this version of RubyGem is not affected to the flaw. We may update RubyGem in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0269" }, { "category": "external", "summary": "RHBZ#909029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0269", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0269" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269" }, { "category": "external", "summary": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/", "url": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/" } ], "release_date": "2013-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-08-29T23:22:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-json: Denial of Service and SQL Injection" }, { "cve": "CVE-2013-1768", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2013-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "984034" } ], "notes": [ { "category": "description", "text": "The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.", "title": "Vulnerability description" }, { "category": "summary", "text": "openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1768" }, { "category": "external", "summary": "RHBZ#984034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984034" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1768", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1768" } ], "release_date": "2013-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-08-29T23:22:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs" }, { "cve": "CVE-2013-1821", "discovery_date": "2013-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "914716" } ], "notes": [ { "category": "description", "text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "ruby: entity expansion DoS vulnerability in REXML", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1821" }, { "category": "external", "summary": "RHBZ#914716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1821" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821" }, { "category": "external", "summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/", "url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/" } ], "release_date": "2013-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-08-29T23:22:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ruby: entity expansion DoS vulnerability in REXML" }, { "acknowledgments": [ { "names": [ "Andreas Falkenberg" ], "organization": "SEC Consult Deutschland GmbH" }, { "names": [ "Christian Mainka", "Juraj Somorovsky", "Joerg Schwenk" ], "organization": "Ruhr-University Bochum" } ], "cve": "CVE-2013-2160", "discovery_date": "2013-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "929197" } ], "notes": [ { "category": "description", "text": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-cxf: Multiple denial of service flaws in the StAX parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2160" }, { "category": "external", "summary": "RHBZ#929197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2160", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160" }, { "category": "external", "summary": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "url": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" } ], "release_date": "2013-06-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-08-29T23:22:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-cxf: Multiple denial of service flaws in the StAX parser" } ] }
rhsa-2013_1028
Vulnerability from csaf_redhat
Published
2013-07-09 17:35
Modified
2024-11-05 18:08
Summary
Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update
Notes
Topic
Fuse ESB Enterprise 7.1.0 roll up patch 1, which fixes multiple security
issues and various bugs, is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Fuse ESB Enterprise, based on Apache ServiceMix, provides an integration
platform.
This release of Fuse ESB Enterprise 7.1.0 roll up patch 1 is an update to
Fuse ESB Enterprise 7.1.0 and includes bug fixes. Refer to the readme file
included with the patch files for information about the bug fixes.
The following security issues are also fixed with this release:
XML encryption backwards compatibility attacks were found against various
frameworks, including Apache CXF. An attacker could force a server to use
insecure, legacy cryptosystems, even when secure cryptosystems were enabled
on endpoints. By forcing the use of legacy cryptosystems, flaws such as
CVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be
recovered from cryptograms and symmetric keys. (CVE-2012-5575)
Note: Automatic checks to prevent CVE-2012-5575 are only run when
WS-SecurityPolicy is used to enforce security requirements. It is best
practice to use WS-SecurityPolicy to enforce security requirements.
A flaw in JRuby's JSON gem allowed remote attacks by creating different
types of malicious objects. For example, it could initiate a denial of
service attack through resource consumption by using a JSON document to
create arbitrary Ruby symbols, which were never garbage collected. It could
also be exploited to create internal objects which could allow a SQL
injection attack. (CVE-2013-0269)
It was discovered that JRuby's REXML library did not properly restrict XML
entity expansion. An attacker could use this flaw to cause a denial of
service by tricking a Ruby application using REXML to read text nodes from
specially-crafted XML content, which will result in REXML consuming large
amounts of system memory. (CVE-2013-1821)
Multiple denial of service flaws were found in the way the Apache CXF
StAX parser implementation processed certain XML files. If a web service
utilized the StAX parser, a remote attacker could provide a
specially-crafted XML file that, when processed, would lead to excessive
CPU and memory consumption. (CVE-2013-2160)
Note: Fuse ESB Enterprise 7.1.0 ships JRuby as part of the camel-ruby
component, which allows users to define Camel routes in Ruby. The default
use of JRuby in Fuse ESB Enterprise 7.1.0 does not appear to expose either
CVE-2013-0269 or CVE-2013-1821. If the version of JRuby shipped with Fuse
ESB Enterprise 7.1.0 was used to build a custom application, then these
flaws could be exposed.
Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj
Somorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; Ruby
on Rails upstream for reporting CVE-2013-0269; and Andreas Falkenberg of
SEC Consult Deutschland GmbH, and Christian Mainka, Juraj Somorovsky and
Joerg Schwenk of Ruhr-University Bochum for reporting CVE-2013-2160.
Upstream acknowledges Thomas Hollstegge of Zweitag and Ben Murphy as the
original reporters of CVE-2013-0269.
All users of Fuse ESB Enterprise 7.1.0 as provided from the Red Hat
Customer Portal are advised to upgrade to Fuse ESB Enterprise 7.1.0 roll up
patch 1.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Fuse ESB Enterprise 7.1.0 roll up patch 1, which fixes multiple security\nissues and various bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Fuse ESB Enterprise, based on Apache ServiceMix, provides an integration\nplatform.\n\nThis release of Fuse ESB Enterprise 7.1.0 roll up patch 1 is an update to\nFuse ESB Enterprise 7.1.0 and includes bug fixes. Refer to the readme file\nincluded with the patch files for information about the bug fixes.\n\nThe following security issues are also fixed with this release:\n\nXML encryption backwards compatibility attacks were found against various\nframeworks, including Apache CXF. An attacker could force a server to use\ninsecure, legacy cryptosystems, even when secure cryptosystems were enabled\non endpoints. By forcing the use of legacy cryptosystems, flaws such as\nCVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be\nrecovered from cryptograms and symmetric keys. (CVE-2012-5575)\n\nNote: Automatic checks to prevent CVE-2012-5575 are only run when\nWS-SecurityPolicy is used to enforce security requirements. It is best\npractice to use WS-SecurityPolicy to enforce security requirements.\n\nA flaw in JRuby\u0027s JSON gem allowed remote attacks by creating different\ntypes of malicious objects. For example, it could initiate a denial of\nservice attack through resource consumption by using a JSON document to\ncreate arbitrary Ruby symbols, which were never garbage collected. It could\nalso be exploited to create internal objects which could allow a SQL\ninjection attack. (CVE-2013-0269)\n\nIt was discovered that JRuby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nMultiple denial of service flaws were found in the way the Apache CXF\nStAX parser implementation processed certain XML files. If a web service\nutilized the StAX parser, a remote attacker could provide a\nspecially-crafted XML file that, when processed, would lead to excessive\nCPU and memory consumption. (CVE-2013-2160)\n\nNote: Fuse ESB Enterprise 7.1.0 ships JRuby as part of the camel-ruby\ncomponent, which allows users to define Camel routes in Ruby. The default\nuse of JRuby in Fuse ESB Enterprise 7.1.0 does not appear to expose either\nCVE-2013-0269 or CVE-2013-1821. If the version of JRuby shipped with Fuse\nESB Enterprise 7.1.0 was used to build a custom application, then these\nflaws could be exposed.\n\nRed Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; Ruby\non Rails upstream for reporting CVE-2013-0269; and Andreas Falkenberg of\nSEC Consult Deutschland GmbH, and Christian Mainka, Juraj Somorovsky and\nJoerg Schwenk of Ruhr-University Bochum for reporting CVE-2013-2160.\nUpstream acknowledges Thomas Hollstegge of Zweitag and Ben Murphy as the\noriginal reporters of CVE-2013-0269.\n\nAll users of Fuse ESB Enterprise 7.1.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Fuse ESB Enterprise 7.1.0 roll up\npatch 1.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1028", "url": "https://access.redhat.com/errata/RHSA-2013:1028" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=fuse.esb.enterprise\u0026downloadType=securityPatches\u0026version=7.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=fuse.esb.enterprise\u0026downloadType=securityPatches\u0026version=7.1.0" }, { "category": "external", "summary": "http://cxf.apache.org/cve-2012-5575.html", "url": "http://cxf.apache.org/cve-2012-5575.html" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" }, { "category": "external", "summary": "880443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443" }, { "category": "external", "summary": "909029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029" }, { "category": "external", "summary": "914716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716" }, { "category": "external", "summary": "929197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1028.json" } ], "title": "Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update", "tracking": { "current_release_date": "2024-11-05T18:08:47+00:00", "generator": { "date": "2024-11-05T18:08:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2013:1028", "initial_release_date": "2013-07-09T17:35:00+00:00", "revision_history": [ { "date": "2013-07-09T17:35:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-07-09T17:36:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:08:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fuse ESB Enterprise 7.1.0", "product": { "name": "Fuse ESB Enterprise 7.1.0", "product_id": "Fuse ESB Enterprise 7.1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:fuse_esb_enterprise:7.1.0" } } } ], "category": "product_family", "name": "Fuse Enterprise Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Tibor Jager", "Kenneth G. Paterson", "Juraj Somorovsky" ], "organization": "Ruhr-University Bochum" } ], "cve": "CVE-2012-5575", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2012-11-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "880443" } ], "notes": [ { "category": "description", "text": "Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka \"XML Encryption backwards compatibility attack.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-cxf: XML encryption backwards compatibility attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Fuse ESB Enterprise 7.1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5575" }, { "category": "external", "summary": "RHBZ#880443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5575", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5575" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575" }, { "category": "external", "summary": "http://cxf.apache.org/cve-2012-5575.html", "url": "http://cxf.apache.org/cve-2012-5575.html" }, { "category": "external", "summary": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/", "url": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/" } ], "release_date": "2013-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-09T17:35:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Fuse ESB Enterprise 7.1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1028" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "Fuse ESB Enterprise 7.1.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-cxf: XML encryption backwards compatibility attacks" }, { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Thomas Hollstegge" ], "organization": "Zweitag", "summary": "Acknowledged by upstream." }, { "names": [ "Ben Murphy" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-0269", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2013-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "909029" } ], "notes": [ { "category": "description", "text": "The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka \"Unsafe Object Creation Vulnerability.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-json: Denial of Service and SQL Injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite tools ship RubyGem Json 1.4.6 which is earlier than affected 1.5.5 version however, this version of RubyGem is not affected to the flaw. We may update RubyGem in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Fuse ESB Enterprise 7.1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0269" }, { "category": "external", "summary": "RHBZ#909029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0269", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0269" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269" }, { "category": "external", "summary": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/", "url": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/" } ], "release_date": "2013-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-09T17:35:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Fuse ESB Enterprise 7.1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1028" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Fuse ESB Enterprise 7.1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-json: Denial of Service and SQL Injection" }, { "cve": "CVE-2013-1821", "discovery_date": "2013-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "914716" } ], "notes": [ { "category": "description", "text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "ruby: entity expansion DoS vulnerability in REXML", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Fuse ESB Enterprise 7.1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1821" }, { "category": "external", "summary": "RHBZ#914716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1821" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821" }, { "category": "external", "summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/", "url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/" } ], "release_date": "2013-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-09T17:35:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Fuse ESB Enterprise 7.1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1028" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Fuse ESB Enterprise 7.1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ruby: entity expansion DoS vulnerability in REXML" }, { "acknowledgments": [ { "names": [ "Andreas Falkenberg" ], "organization": "SEC Consult Deutschland GmbH" }, { "names": [ "Christian Mainka", "Juraj Somorovsky", "Joerg Schwenk" ], "organization": "Ruhr-University Bochum" } ], "cve": "CVE-2013-2160", "discovery_date": "2013-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "929197" } ], "notes": [ { "category": "description", "text": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-cxf: Multiple denial of service flaws in the StAX parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Fuse ESB Enterprise 7.1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2160" }, { "category": "external", "summary": "RHBZ#929197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2160", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160" }, { "category": "external", "summary": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "url": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" } ], "release_date": "2013-06-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-09T17:35:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Fuse ESB Enterprise 7.1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1028" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Fuse ESB Enterprise 7.1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-cxf: Multiple denial of service flaws in the StAX parser" } ] }
rhsa-2013_1437
Vulnerability from csaf_redhat
Published
2013-10-16 16:45
Modified
2024-11-05 18:13
Summary
Red Hat Security Advisory: Red Hat JBoss Portal 6.1.0 update
Notes
Topic
Red Hat JBoss Portal 6.1.0, which fixes multiple security
issues and various bugs, is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
This Red Hat JBoss Portal 6.1.0 release serves as a replacement for
6.0.0. Refer to the 6.1.0 Release Notes for further information, available
shortly from https://access.redhat.com/knowledge/docs/
It was found that sending a request without a session identifier to a
protected resource could bypass the CSRF prevention filter in JBoss Web. A
remote attacker could use this flaw to perform CSRF attacks against
applications that rely on the CSRF prevention filter. (CVE-2012-4431)
When applications used the COOKIE session tracking method, the jsessionid
would be appended as a query string parameter when processing the first
request of a session. This could possibly lead to users' sessions being
hijacked via man-in-the-middle attacks. (CVE-2012-4529)
If multiple applications used the same custom authorization module class
name, and provided their own implementations of it, the first application
to be loaded will have its implementation used for all other applications
using the same custom authorization module class name. A local attacker
could deploy a malicious application that provides implementations of
custom authorization modules that apply authorization rules supplied by the
attacker. (CVE-2012-4572)
XML encryption backwards compatibility attacks were found against various
frameworks, including Apache CXF. An attacker could force a server to use
insecure, legacy cryptosystems, even when secure cryptosystems were enabled
on endpoints. By forcing the use of legacy cryptosystems, flaws such as
CVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be
recovered from cryptograms and symmetric keys. (CVE-2012-5575)
Note: Automatic checks to prevent CVE-2012-5575 are only run when
WS-SecurityPolicy is used to enforce security requirements, which is best
practice.
The data file used by PicketBox Vault to store encrypted passwords contains
a copy of its own admin key. The file is encrypted using only this admin
key, not the corresponding JKS key. A local attacker with permission to
read the vault data file could read the admin key from the file.
(CVE-2013-1921)
A session fixation flaw was found in the Tomcat FormAuthenticator module.
(CVE-2013-2067)
When a JGroups channel was started, the JGroups diagnostics service was
enabled by default with no authentication via IP multicast. An attacker on
an adjacent network could exploit this flaw to read diagnostics
information. (CVE-2013-2102)
Multiple denial of service flaws were found in the way the Apache CXF StAX
parser implementation processed certain XML files. A remote attacker could
provide a specially crafted XML file that, when processed, would lead to
excessive CPU and memory consumption. (CVE-2013-2160)
A flaw was found in the way Apache Santuario XML Security for Java
validated XML signatures. Santuario allowed a signature to specify an
arbitrary canonicalization algorithm, which would be applied to the
SignedInfo XML fragment. A remote attacker could exploit this to spoof an
XML signature, via a specially-crafted XML signature block. (CVE-2013-2172)
A flaw was found in JGroup's DiagnosticsHandler that allowed an attacker on
an adjacent network to reuse the credentials from a previous successful
authentication. This could be exploited to read diagnostic information and
attain limited remote code execution. (CVE-2013-4112)
A flaw was discovered in the way authenticated connections were cached on
the server by remote-naming. After a user has successfully logged in, a
remote attacker could use a remoting client to log in as that user without
knowing their password, allowing them to access data and perform actions
with the privileges of that user. (CVE-2013-4128)
A flaw was discovered in the way connections for remote EJB invocations via
the EJB client API were cached on the server. After a user has successfully
logged in, a remote attacker could use an EJB client to log in as that user
without knowing their password. (CVE-2013-4213)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Portal 6.1.0, which fixes multiple security\nissues and various bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This Red Hat JBoss Portal 6.1.0 release serves as a replacement for\n6.0.0. Refer to the 6.1.0 Release Notes for further information, available\nshortly from https://access.redhat.com/knowledge/docs/\n\nIt was found that sending a request without a session identifier to a\nprotected resource could bypass the CSRF prevention filter in JBoss Web. A\nremote attacker could use this flaw to perform CSRF attacks against\napplications that rely on the CSRF prevention filter. (CVE-2012-4431)\n\nWhen applications used the COOKIE session tracking method, the jsessionid\nwould be appended as a query string parameter when processing the first\nrequest of a session. This could possibly lead to users\u0027 sessions being\nhijacked via man-in-the-middle attacks. (CVE-2012-4529)\n\nIf multiple applications used the same custom authorization module class\nname, and provided their own implementations of it, the first application\nto be loaded will have its implementation used for all other applications\nusing the same custom authorization module class name. A local attacker\ncould deploy a malicious application that provides implementations of\ncustom authorization modules that apply authorization rules supplied by the\nattacker. (CVE-2012-4572)\n\nXML encryption backwards compatibility attacks were found against various\nframeworks, including Apache CXF. An attacker could force a server to use\ninsecure, legacy cryptosystems, even when secure cryptosystems were enabled\non endpoints. By forcing the use of legacy cryptosystems, flaws such as\nCVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be\nrecovered from cryptograms and symmetric keys. (CVE-2012-5575)\n\nNote: Automatic checks to prevent CVE-2012-5575 are only run when\nWS-SecurityPolicy is used to enforce security requirements, which is best\npractice.\n\nThe data file used by PicketBox Vault to store encrypted passwords contains\na copy of its own admin key. The file is encrypted using only this admin\nkey, not the corresponding JKS key. A local attacker with permission to\nread the vault data file could read the admin key from the file.\n(CVE-2013-1921)\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\n(CVE-2013-2067)\n\nWhen a JGroups channel was started, the JGroups diagnostics service was\nenabled by default with no authentication via IP multicast. An attacker on\nan adjacent network could exploit this flaw to read diagnostics\ninformation. (CVE-2013-2102)\n\nMultiple denial of service flaws were found in the way the Apache CXF StAX\nparser implementation processed certain XML files. A remote attacker could\nprovide a specially crafted XML file that, when processed, would lead to\nexcessive CPU and memory consumption. (CVE-2013-2160)\n\nA flaw was found in the way Apache Santuario XML Security for Java\nvalidated XML signatures. Santuario allowed a signature to specify an\narbitrary canonicalization algorithm, which would be applied to the\nSignedInfo XML fragment. A remote attacker could exploit this to spoof an\nXML signature, via a specially-crafted XML signature block. (CVE-2013-2172)\n\nA flaw was found in JGroup\u0027s DiagnosticsHandler that allowed an attacker on\nan adjacent network to reuse the credentials from a previous successful\nauthentication. This could be exploited to read diagnostic information and\nattain limited remote code execution. (CVE-2013-4112)\n\nA flaw was discovered in the way authenticated connections were cached on\nthe server by remote-naming. After a user has successfully logged in, a\nremote attacker could use a remoting client to log in as that user without\nknowing their password, allowing them to access data and perform actions\nwith the privileges of that user. (CVE-2013-4128)\n\nA flaw was discovered in the way connections for remote EJB invocations via\nthe EJB client API were cached on the server. After a user has successfully\nlogged in, a remote attacker could use an EJB client to log in as that user\nwithout knowing their password. (CVE-2013-4213)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1437", "url": "https://access.redhat.com/errata/RHSA-2013:1437" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=distributions", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=distributions" }, { "category": "external", "summary": "868202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868202" }, { "category": "external", "summary": "872059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872059" }, { "category": "external", "summary": "880443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443" }, { "category": "external", "summary": "883636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883636" }, { "category": "external", "summary": "929197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "category": "external", "summary": "948106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=948106" }, { "category": "external", "summary": "961779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779" }, { "category": "external", "summary": "963984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=963984" }, { "category": "external", "summary": "983489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=983489" }, { "category": "external", "summary": "984795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984795" }, { "category": "external", "summary": "985359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=985359" }, { "category": "external", "summary": "999263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=999263" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1437.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Portal 6.1.0 update", "tracking": { "current_release_date": "2024-11-05T18:13:32+00:00", "generator": { "date": "2024-11-05T18:13:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2013:1437", "initial_release_date": "2013-10-16T16:45:00+00:00", "revision_history": [ { "date": "2013-10-16T16:45:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-16T16:53:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:13:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Portal Platform 6.1", "product": { "name": "Red Hat JBoss Portal Platform 6.1", "product_id": "Red Hat JBoss Portal Platform 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:6.1.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-4431", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2012-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "883636" } ], "notes": [ { "category": "description", "text": "org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.", "title": "Vulnerability description" }, { "category": "summary", "text": "Tomcat/JBoss Web - Bypass of CSRF prevention filter", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of tomcat5 as shipped with Red Hat Enterprise Linux 5 and tomcat6 as shipped with Red Hat Enterprise Linux 6 as they did not include the CSRF prevention filter.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4431" }, { "category": "external", "summary": "RHBZ#883636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883636" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4431", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4431" }, { "category": "external", "summary": "http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.36", "url": "http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.36" }, { "category": "external", "summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.32", "url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.32" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Tomcat/JBoss Web - Bypass of CSRF prevention filter" }, { "cve": "CVE-2012-4529", "discovery_date": "2012-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "868202" } ], "notes": [ { "category": "description", "text": "The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.", "title": "Vulnerability description" }, { "category": "summary", "text": "Web: jsessionid exposed via encoded url when using cookie based session tracking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4529" }, { "category": "external", "summary": "RHBZ#868202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4529", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4529" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4529", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4529" } ], "release_date": "2012-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Web: jsessionid exposed via encoded url when using cookie based session tracking" }, { "acknowledgments": [ { "names": [ "Josef Cacek" ], "organization": "Red Hat JBoss EAP Quality Engineering team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-4572", "discovery_date": "2012-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "872059" } ], "notes": [ { "category": "description", "text": "Red Hat JBoss Enterprise Application Platform (EAP) before 6.1.0 and JBoss Portal before 6.1.0 does not load the implementation of a custom authorization module for a new application when an implementation is already loaded and the modules share class names, which allows local users to control certain applications\u0027 authorization decisions via a crafted application.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss: custom authorization module implementations shared between applications", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4572" }, { "category": "external", "summary": "RHBZ#872059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872059" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4572", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4572" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4572", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4572" } ], "release_date": "2013-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JBoss: custom authorization module implementations shared between applications" }, { "acknowledgments": [ { "names": [ "Tibor Jager", "Kenneth G. Paterson", "Juraj Somorovsky" ], "organization": "Ruhr-University Bochum" } ], "cve": "CVE-2012-5575", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2012-11-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "880443" } ], "notes": [ { "category": "description", "text": "Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka \"XML Encryption backwards compatibility attack.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-cxf: XML encryption backwards compatibility attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5575" }, { "category": "external", "summary": "RHBZ#880443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5575", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5575" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575" }, { "category": "external", "summary": "http://cxf.apache.org/cve-2012-5575.html", "url": "http://cxf.apache.org/cve-2012-5575.html" }, { "category": "external", "summary": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/", "url": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/" } ], "release_date": "2013-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-cxf: XML encryption backwards compatibility attacks" }, { "cve": "CVE-2013-1921", "discovery_date": "2013-04-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "948106" } ], "notes": [ { "category": "description", "text": "PicketBox, as used in Red Hat JBoss Enterprise Application Platform before 6.1.1, allows local users to obtain the admin encryption key by reading the Vault data file.", "title": "Vulnerability description" }, { "category": "summary", "text": "PicketBox: Insecure storage of masked passwords", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1921" }, { "category": "external", "summary": "RHBZ#948106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=948106" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1921", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1921" } ], "release_date": "2013-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 1.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "PicketBox: Insecure storage of masked passwords" }, { "cve": "CVE-2013-2067", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961779" } ], "notes": [ { "category": "description", "text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Session fixation in form authenticator", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2067" }, { "category": "external", "summary": "RHBZ#961779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Session fixation in form authenticator" }, { "acknowledgments": [ { "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-2102", "discovery_date": "2013-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "963984" } ], "notes": [ { "category": "description", "text": "The default configuration of Red Hat JBoss Portal before 6.1.0 enables the JGroups diagnostics service with no authentication when a JGroups channel is started, which allows remote attackers to obtain sensitive information (diagnostics) by accessing the service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Gatein: JGroups configurations enable diagnostics without authentication", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2102" }, { "category": "external", "summary": "RHBZ#963984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=963984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2102", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2102" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2102", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2102" } ], "release_date": "2013-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Gatein: JGroups configurations enable diagnostics without authentication" }, { "acknowledgments": [ { "names": [ "Andreas Falkenberg" ], "organization": "SEC Consult Deutschland GmbH" }, { "names": [ "Christian Mainka", "Juraj Somorovsky", "Joerg Schwenk" ], "organization": "Ruhr-University Bochum" } ], "cve": "CVE-2013-2160", "discovery_date": "2013-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "929197" } ], "notes": [ { "category": "description", "text": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-cxf: Multiple denial of service flaws in the StAX parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2160" }, { "category": "external", "summary": "RHBZ#929197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2160", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160" }, { "category": "external", "summary": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc", "url": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" } ], "release_date": "2013-06-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-cxf: Multiple denial of service flaws in the StAX parser" }, { "cve": "CVE-2013-2172", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2013-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "999263" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially crafted XML signature block.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java: XML signature spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2172" }, { "category": "external", "summary": "RHBZ#999263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=999263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2172", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2172" }, { "category": "external", "summary": "http://santuario.apache.org/secadv.data/CVE-2013-2172.txt.asc", "url": "http://santuario.apache.org/secadv.data/CVE-2013-2172.txt.asc" } ], "release_date": "2013-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Java: XML signature spoofing" }, { "cve": "CVE-2013-4112", "discovery_date": "2013-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "983489" } ], "notes": [ { "category": "description", "text": "The DiagnosticsHandler in JGroup 3.0.x, 3.1.x, 3.2.x before 3.2.9, and 3.3.x before 3.3.3 allows remote attackers to obtain sensitive information (diagnostic information) and execute arbitrary code by reusing valid credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "JGroups: Authentication via cached credentials", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4112" }, { "category": "external", "summary": "RHBZ#983489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=983489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4112", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4112" } ], "release_date": "2013-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JGroups: Authentication via cached credentials" }, { "acknowledgments": [ { "names": [ "Wolf-Dieter Fink" ], "organization": "Red Hat GSS Team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-4128", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2013-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "984795" } ], "notes": [ { "category": "description", "text": "Red Hat JBoss Enterprise Application Platform (EAP) 6.1.0 does not properly cache EJB invocations by remote-naming, which allows remote attackers to hijack sessions by using a remoting client.", "title": "Vulnerability description" }, { "category": "summary", "text": "remote-naming: Session fixation due improper connection caching", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4128" }, { "category": "external", "summary": "RHBZ#984795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4128", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4128" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4128", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4128" } ], "release_date": "2013-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "remote-naming: Session fixation due improper connection caching" }, { "acknowledgments": [ { "names": [ "Wolf-Dieter Fink" ], "organization": "Red Hat GSS Team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-4213", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2013-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "985359" } ], "notes": [ { "category": "description", "text": "Red Hat JBoss Enterprise Application Platform (EAP) 6.1.0 does not properly cache EJB invocations by the EJB client API, which allows remote attackers to hijack sessions by using an EJB client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ejb-client: Session fixation due improper connection caching", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4213" }, { "category": "external", "summary": "RHBZ#985359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=985359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4213", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4213" } ], "release_date": "2013-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ejb-client: Session fixation due improper connection caching" }, { "acknowledgments": [ { "names": [ "David Jorm" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-6495", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1066794" } ], "notes": [ { "category": "description", "text": "JBossWeb Bayeux has reflected XSS", "title": "Vulnerability description" }, { "category": "summary", "text": "Bayeux: Reflected Cross-Site Scripting (XSS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat JBoss Enterprise Application Platform 6 prior to 6.1.1 and Red Hat JBoss Portal Platform 6 prior to 6.1.0 are affected by this flaw. All users of vulnerable versions are advised to update to 6.1.1 or later of Red Hat JBoss Enterprise Application Platform 6 and 6.1.0 or later of Red Hat JBoss Portal Platform 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal Platform 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6495" }, { "category": "external", "summary": "RHBZ#1066794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6495", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6495" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6495", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6495" } ], "release_date": "2014-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-16T16:45:00+00:00", "details": "Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; and\nAndreas Falkenberg of SEC Consult Deutschland GmbH, and Christian Mainka,\nJuraj Somorovsky, and Joerg Schwenk of Ruhr-University Bochum for reporting\nCVE-2013-2160. CVE-2012-4572 was discovered by Josef Cacek of the Red Hat\nJBoss EAP Quality Engineering team; CVE-2013-4128 and CVE-2013-4213 were\ndiscovered by Wolf-Dieter Fink of the Red Hat GSS Team; and CVE-2013-2102\nwas discovered by Red Hat.\n\nAll users of Red Hat JBoss Portal 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal Platform 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1437" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal Platform 6.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Bayeux: Reflected Cross-Site Scripting (XSS)" } ] }
ghsa-254q-rp36-v2m8
Vulnerability from github
Published
2022-05-13 01:09
Modified
2022-07-08 19:08
Summary
Missing XML Validation in Apache CXF
Details
The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.cxf:cxf-rt-frontend-jaxrs" }, "ranges": [ { "events": [ { "introduced": "2.5.0" }, { "fixed": "2.5.10" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.cxf:cxf-rt-frontend-jaxrs" }, "ranges": [ { "events": [ { "introduced": "2.6.0" }, { "fixed": "2.6.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.cxf:cxf-rt-frontend-jaxrs" }, "ranges": [ { "events": [ { "introduced": "2.7.0" }, { "fixed": "2.7.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2013-2160" ], "database_specific": { "cwe_ids": [ "CWE-112" ], "github_reviewed": true, "github_reviewed_at": "2022-07-08T19:08:08Z", "nvd_published_at": "2013-08-19T23:55:00Z", "severity": "MODERATE" }, "details": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.", "id": "GHSA-254q-rp36-v2m8", "modified": "2022-07-08T19:08:08Z", "published": "2022-05-13T01:09:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197" }, { "type": "WEB", "url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "http://jira.codehaus.org/browse/WSTX-285" }, { "type": "WEB", "url": "http://jira.codehaus.org/browse/WSTX-287" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html" } ], "schema_version": "1.4.0", "severity": [], "summary": "Missing XML Validation in Apache CXF" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.