Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 27 Jun 2017 16:58:30 -0700
From: Denis Magda <dmagda@...che.org>
To: oss-security@...ts.openwall.com
Subject: [CVE-2017-7686] Apache Ignite Information Disclosure

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

* Apache Ignite 1.0.0-RC3 to 2.0

Impact:

Apache Ignite Might Transfer Sensitive Information to 3rd Party Domain

Description:

Apache Ignite uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. Some of the properties might contain user sensitive information.

Mitigation:

* The domain (http://ignite.run) was moved to ASF and the server was brought down. No data transfer longer happens by default. No extra actions are needed on the end user side.

Credit:

The vulnerability was discovered by: 

* Makoto Yui of Treasure Data, Inc.

References:

* http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7686

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.