Bug 829560 (CVE-2012-2672)

Summary: CVE-2012-2672 Mojarra: deployed web applications can read FacesContext from other applications under certain conditions
Product: [Other] Security Response Reporter: David Jorm <djorm>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: aneelica, mjc, pcheung
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-08-19 05:50:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 830023, 830024    
Bug Blocks: 829561, 881519    

Description David Jorm 2012-06-07 03:12:55 UTC
It was found that in Mojarra, the FacesContext that is made available during application startup is held in a ThreadLocal. The reference is not properly cleaned up in all cases. As a result, if a JSF WAR calls FacesContext.getCurrentInstance() during application startup, another WAR can get access to the leftover context and thus get access to the other WAR's resources.

Comment 1 David Jorm 2012-06-07 03:19:55 UTC
Upstream bug: http://java.net/jira/browse/JAVASERVERFACES-2436

Comment 2 Arun Babu Neelicattu 2012-06-08 02:47:21 UTC
This issue only affects EAP6/AS7. Older versions are not affected.

Comment 4 David Jorm 2012-06-08 02:54:29 UTC
Created jboss-jsf-2.1-api tracking bugs for this issue

Affects: fedora-17 [bug 830024]

Comment 6 David Jorm 2012-07-12 01:16:20 UTC
This issue has been resolved upstream in Mojarra 2.1.11 and 2.2-m05. A patch and updated JARs are attached to the upstream bug: http://java.net/jira/browse/JAVASERVERFACES-2436

Comment 8 David Jorm 2012-08-06 04:32:32 UTC
The upstream Mojarra fix for this issue introduced a class loader leak. An updated patch that resolves both the security issue and the class loader leak will be available in Mojarra 2.1.12.

Comment 12 David Jorm 2012-10-22 21:28:07 UTC
Acknowledgements:

This issue was discovered by Marek Schmidt and Stan Silvert of Red Hat.

Comment 16 errata-xmlrpc 2012-12-18 22:21:34 UTC
This issue has been addressed in following products:

  JBEAP 6 for RHEL 5

Via RHSA-2012:1591 https://rhn.redhat.com/errata/RHSA-2012-1591.html

Comment 17 errata-xmlrpc 2012-12-18 22:33:26 UTC
This issue has been addressed in following products:

  JBEAP 6 for RHEL 6

Via RHSA-2012:1592 https://rhn.redhat.com/errata/RHSA-2012-1592.html

Comment 18 errata-xmlrpc 2012-12-18 22:53:24 UTC
This issue has been addressed in following products:

  JBoss Enterprise Application Platform 6.0.1

Via RHSA-2012:1594 https://rhn.redhat.com/errata/RHSA-2012-1594.html