Bug 1439520 (CVE-2017-7464)
Summary: | CVE-2017-7464 JBoss: JAXP in EAP 7.0 allows info disclosure via XXE | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jason Shepherd <jshepherd> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | avibelli, bbaranow, belaran-do-not-use, bmaxwell, cdewolf, chazlett, csutherl, dandread, darran.lofthouse, dimitris, dosoudil, gsterlin, gzaronik, jawilson, jbalunas, jclere, jshepherd, lgao, mbabacek, myarboro, ngalvin, pgier, ppalaga, psakar, pslavice, psotirop, rmartinc, rnetuka, rpelisse, rrajasek, rsvoboda, security-response-team, tkirby, twalsh, vtunka, weli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
It was found that the JAXP implementation used in EAP 7.0 for SAX and DOM parsing is vulnerable to certain XXE flaws. An attacker could use this flaw to cause DoS, SSRF, or information disclosure if they are able to provide XML content for parsing.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-07-12 13:04:28 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1439976 |
Description
Jason Shepherd
2017-04-06 07:24:47 UTC
Acknowledgments: Name: Jason Shepherd (Red Hat) Mitigation: Enable the security features of the DocumentBuilderFactory or SaxParserFactory as described by OWASP: https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Prevention_Cheat_Sheet#JAXP_DocumentBuilderFactory.2C_SAXParserFactory_and_DOM4J I found a workaround for this issue, which was to set: parserFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); I think we should close this one as WONTFIX. But perhaps we can raise a new issues to get the secure options set by default from EAP 7.1? This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-7464 |