Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1130383 - (CVE-2014-3599) CVE-2014-3599 HornetQ REST: XXE due to insecure configuration of RestEasy
CVE-2014-3599 HornetQ REST: XXE due to insecure configuration of RestEasy
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20141118,repor...
: Security
Depends On:
Blocks: 1135934
  Show dependency treegraph
 
Reported: 2014-08-15 01:35 EDT by Arun Babu Neelicattu
Modified: 2015-02-15 16:55 EST (History)
3 users (show)

See Also:
Fixed In Version: hornetq-rest 2.5.0.Beta1
Doc Type: Bug Fix
Doc Text:
It was discovered that HornetQ REST did not set the resteasy.document.expand.entity.references context parameter to false by default. A HornetQ REST application, which does not explicitly set the required context parameter to false, may be vulnerable to XML External Entity (XXE) attacks. A remote attacker able to send XML requests to a HornetQ REST endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-12-06 00:00:29 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Arun Babu Neelicattu 2014-08-15 01:35:45 EDT
IssueDescription:

It was discovered that HornetQ REST did not set the resteasy.document.expand.entity.references context parameter to false by default. A HornetQ REST application, which does not explicitly set the required context parameter to false, may be vulnerable to XML External Entity (XXE) attacks. A remote attacker able to send XML requests to a HornetQ REST endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Comment 1 Arun Babu Neelicattu 2014-08-15 01:38:08 EDT
Acknowledgements:

Red Hat would like to thank Georgi Geshev of MWR Labs for reporting this issue.
Comment 2 Arun Babu Neelicattu 2014-08-15 01:40:46 EDT
Mitigation:

When using HornetQ REST in an application, add the following snippet to its web.xml file to disable entity expansion in RESTEasy as used by HornetQ REST endpoints:

<context-param>
        <param-name>resteasy.document.expand.entity.references</param-name>
        <param-value>false</param-value>
</context-param>

Note that this <context-param> setting has precedence over <init-param>, and will override a contrary setting in an <init-param> element.
Comment 3 Arun Babu Neelicattu 2014-08-15 04:53:48 EDT
Upstream Issue:

https://issues.jboss.org/browse/HORNETQ-1390
Comment 4 Arun Babu Neelicattu 2014-08-15 05:22:55 EDT
Statement:

Not Vulnerable. HornetQ REST is not provided by any Red Hat product.
Comment 5 Arun Babu Neelicattu 2014-09-29 09:25:21 EDT
Upstream Fix:

https://github.com/hornetq/hornetq/commit/b3a63576371828d5f8e64ba7ccbcecb1da8111d2
Comment 6 Arun Babu Neelicattu 2014-12-05 23:59:55 EST
Victims Record:

https://github.com/victims/victims-cve-db/blob/master/database/java/2014/3599.yaml

Note You need to log in before you can comment on or make changes to this bug.