Bug 1169553 (CVE-2014-8125)

Summary: CVE-2014-8125 jBPM: BPMN2 file processing XXE in Process Execution
Product: [Other] Security Response Reporter: Pavel Polischouk <pavelp>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, alazarot, chazlett, etirelli, gvarsami, jcoleman, jolee, jpallich, kconner, kverlaen, ldimaggi, lpetrovi, mbaluch, mswiders, mwinkler, nwallace, rrajasek, rwagner, rzhang, security-response-team, tcunning, tkirby, tsurdilo, vhalbert, weli
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
It was discovered that the jBPM runtime performed expansion of external parameter entities while executing BPMN2 files. A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XML eXternal Entity (XXE) attacks.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:36:48 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1169568, 1169569, 1169570, 1169571, 1169572, 1169573, 1181370, 1181371, 1181372, 1181373, 1181374, 1181375    
Bug Blocks: 1169514, 1196295, 1210482, 1385169    

Description Pavel Polischouk 2014-12-02 01:56:11 UTC
An XXE flaw was found in the jBPM runtime while executing BPMN2 files. A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

Comment 1 Pavel Polischouk 2014-12-02 01:58:14 UTC
Acknowledgements:

This issue was discovered by Jeremy Lindop of Red Hat.

Comment 8 Pavel Polischouk 2015-01-30 15:58:22 UTC
Statement:

Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; and Red Hat JBoss Enterprise SOA Platform 4 and 5 are now in Phase 3, Extended Life Support, of their respective life cycles. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/

Comment 10 errata-xmlrpc 2015-04-16 16:08:19 UTC
This issue has been addressed in the following products:

  JBoss BPM Suite 6.1.0

Via RHSA-2015:0851 https://rhn.redhat.com/errata/RHSA-2015-0851.html

Comment 11 errata-xmlrpc 2015-04-16 16:11:10 UTC
This issue has been addressed in the following products:

  JBoss BRMS 6.1.0

Via RHSA-2015:0850 https://rhn.redhat.com/errata/RHSA-2015-0850.html