Date: Fri, 5 Oct 2018 15:52:23 +0300 From: Taher Alkhateeb <slidingfilaments@...il.com> To: user@...iz.apache.org, dev@...iz.apache.org, security@...iz.apache.org, security@...che.org, announce@...che.org, oss-security@...ts.openwall.com, jamesp@...dpointgroup.com Subject: [SECURITY] CVE-2011-3600 Apache OFBiz XML-RPC XXE Vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: OFBiz 16.11.01 to 16.11.04 Description: The OFBiz XML-RPC event handler (org.apache.ofbiz.webapp.event.XmlRpcEventHandler.java) acts as a wrapper for any OFBiz service that provides XML-RPC web services via the /webtools/control/xmlrpc endpoint. This endpoint is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. Mitigation: Upgrade to 16.11.05 or manually apply the following commits on branch 16 r1833724 r1833708 r1836141 Example: # Payload to find an exposed port <?xml version="1.0"?> <!DOCTYPE x SYSTEM "http://localhost:8080"> <methodCall> <methodName>ping</methodName> </methodCall> # Payload to display file contents <?xml version="1.0"?> <!DOCTYPE foo [ <!ENTITY disclose SYSTEM "file:///etc/passwd"> ]> <methodCall> <methodName>&disclose;</methodName> </methodCall> Credit: James Parfet <jamesp at mindpointgroup.com> References: http://ofbiz.apache.org/download.html#vulnerabilities
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.