Bug 1933816 (CVE-2020-11988)

Summary: CVE-2020-11988 xmlgraphics-commons: SSRF due to improper input validation by the XMPParser
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, akoufoud, akurtako, alazarot, almorale, andjrobins, anstephe, bibryam, chazlett, dbhole, drieden, ebaron, eclipse-sig, etirelli, ganandan, ggaughan, gmalinko, hbraun, ibek, janstey, java-maint, jerboaa, jjohnstn, jkang, jochrist, jstastny, jwon, krathod, kverlaen, lef, mcermak, mizdebsk, mnovotny, mprchlik, pantinor, patrickm, pjindal, rgrunber, rlandman, rrajasek, rsynek, sdaley, vkadlcik
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: xmlgraphics-commons 2.6 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-06-17 15:04:09 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1933817, 1933818, 1938380, 1938381    
Bug Blocks: 1933819    

Description Guilherme de Almeida Suckevicz 2021-03-01 19:07:13 UTC
Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

References:
https://xmlgraphics.apache.org/security.html
https://www.openwall.com/lists/oss-security/2021/02/24/1

Comment 1 Guilherme de Almeida Suckevicz 2021-03-01 19:07:44 UTC
Created eclipse tracking bugs for this issue:

Affects: fedora-all [bug 1933818]


Created xmlgraphics-commons tracking bugs for this issue:

Affects: fedora-all [bug 1933817]

Comment 9 Todd Cullum 2021-03-13 01:39:37 UTC
Statement:

This flaw does not affect xmlgraphics-commons as shipped with Red Hat Enterprise Linux 8. It is out of support scope for Red Hat Enterprise Linux 6 and 7. To  learn more about support scope for Red Hat Enterprise Linux, please see https://access.redhat.com/support/policy/updates/errata/ .

Comment 12 Todd Cullum 2021-03-15 22:01:48 UTC
External References:

https://xmlgraphics.apache.org/security.html

Comment 13 Todd Cullum 2021-03-15 22:01:51 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 14 Todd Cullum 2021-03-15 22:07:05 UTC
Flaw summary:

src/main/java/org/apache/xmlgraphics/xmp/XMPParser.java loaded external DTDs which could allow an malicious attacker to perform a server-side request forgery attack and execute arbitrary GET requests on the victim server. This could lead to compromise of data confidentiality and/or integrity.

Comment 17 errata-xmlrpc 2021-06-17 13:15:22 UTC
This issue has been addressed in the following products:

  RHPAM 7.11.0

Via RHSA-2021:2475 https://access.redhat.com/errata/RHSA-2021:2475

Comment 18 errata-xmlrpc 2021-06-17 13:19:33 UTC
This issue has been addressed in the following products:

  RHDM 7.11.0

Via RHSA-2021:2476 https://access.redhat.com/errata/RHSA-2021:2476

Comment 19 Product Security DevOps Team 2021-06-17 15:04:09 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-11988

Comment 20 errata-xmlrpc 2021-12-14 21:33:52 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.10

Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134