Bug 1860054 (CVE-2020-14338)

Summary: CVE-2020-14338 wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl
Product: [Other] Security Response Reporter: Chess Hazlett <chazlett>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aboyko, aileenc, akoufoud, alazarot, almorale, anstephe, asoldano, atangrin, ataylor, avibelli, bbaranow, bgeorges, bmaxwell, brian.stansberry, cdewolf, chazlett, darran.lofthouse, dkreling, dosoudil, drieden, eleandro, etirelli, ganandan, ggaughan, gmalinko, gsuckevi, gvarsami, ibek, iweiss, janstey, jawilson, jbalunas, jcoleman, jochrist, jolee, jpallich, jperkins, jross, jschatte, jstastny, jwon, kconner, krathod, kverlaen, kwills, ldimaggi, lgao, loleary, lthon, mnovotny, msochure, msvehla, mszynkie, nwallace, pdrozd, pgallagh, pjindal, pmackay, psotirop, rguimara, rrajasek, rruss, rstancel, rsvoboda, rsynek, rwagner, sdaley, security-response-team, smaestri, spinder, sthorger, tcunning, theute, tkirby, tom.jenkinson, vhalbert
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: xerces jboss-2.12.0.SP3 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Wildfly's implementation of Xerces, specifically in the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the "use-grammar-pool-only" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as CVE-2020-14621, which affected OpenJDK, and uses a similar code.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-10-13 20:21:20 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1860056    

Description Chess Hazlett 2020-07-23 15:57:34 UTC
A flaw was found in Wildfly's implementation of xerces, specifically in the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the "use-grammar-pool-only" feature.  A specially-crafted XML file could possibly use this flaw to manipulate with the validation process in certain cases. This is the same flaw as CVE-2020-14621, which affected OpenJDK, which uses similar code.

Comment 3 Guilherme de Almeida Suckevicz 2020-07-23 17:48:21 UTC
*** Bug 1860076 has been marked as a duplicate of this bug. ***

Comment 6 Ted Jongseok Won 2020-07-24 03:01:36 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Enterprise Application Platform 5
 * Red Hat JBoss Enterprise Application Platform 6
 * Red Hat JBoss Data Grid 7
 * Red Hat JBoss Fuse 6
 * Red Hat JBoss AMQ 6
 * Red Hat JBoss BRMS 6
 * Red Hat JBoss Data Virtualization 6
 * Red Hat JBoss Operations Network 3
 * Red Hat JBoss Fuse Service Works 6
 * Red Hat JBoss SOA Platform 5

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 16 errata-xmlrpc 2020-10-13 16:48:09 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 6

Via RHSA-2020:4244 https://access.redhat.com/errata/RHSA-2020:4244

Comment 17 errata-xmlrpc 2020-10-13 16:52:18 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 8

Via RHSA-2020:4245 https://access.redhat.com/errata/RHSA-2020:4245

Comment 18 errata-xmlrpc 2020-10-13 16:56:48 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 7

Via RHSA-2020:4246 https://access.redhat.com/errata/RHSA-2020:4246

Comment 19 errata-xmlrpc 2020-10-13 17:01:41 UTC
This issue has been addressed in the following products:

  EAP 7.3.3

Via RHSA-2020:4247 https://access.redhat.com/errata/RHSA-2020:4247

Comment 20 Product Security DevOps Team 2020-10-13 20:21:20 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14338

Comment 21 errata-xmlrpc 2020-11-04 19:24:31 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4.3

Via RHSA-2020:4931 https://access.redhat.com/errata/RHSA-2020:4931

Comment 22 errata-xmlrpc 2020-12-16 07:20:32 UTC
This issue has been addressed in the following products:

  Red Hat Openshift Application Runtimes

Via RHSA-2020:5361 https://access.redhat.com/errata/RHSA-2020:5361

Comment 23 errata-xmlrpc 2021-02-17 12:08:13 UTC
This issue has been addressed in the following products:

  RHPAM 7.10.0

Via RHSA-2021:0600 https://access.redhat.com/errata/RHSA-2021:0600

Comment 24 errata-xmlrpc 2021-02-17 13:40:13 UTC
This issue has been addressed in the following products:

  RHDM 7.10.0

Via RHSA-2021:0603 https://access.redhat.com/errata/RHSA-2021:0603

Comment 25 errata-xmlrpc 2021-08-11 18:26:00 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.9

Via RHSA-2021:3140 https://access.redhat.com/errata/RHSA-2021:3140