Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1213007 - (CVE-2015-1926) CVE-2015-1926 Portlet spec: Information disclosure via missing access restriction in resource dispatching
CVE-2015-1926 Portlet spec: Information disclosure via missing access restric...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150730,repor...
: Security
Depends On: 1241204 1241205 1241206
Blocks: 1213008
  Show dependency treegraph
 
Reported: 2015-04-17 18:20 EDT by Chess Hazlett
Modified: 2015-12-03 11:03 EST (History)
11 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
The Java Portlet Specification JSR286 API jar file code could allow a remote attacker to obtain sensitive information, caused by the failure to restrict access to resources located within the web application. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-07-30 15:10:09 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Chess Hazlett 2015-04-17 18:20:14 EDT
The Java Portlet Specification JSR286 API jar file code could
allow a remote attacker to obtain sensitive information, caused by the
failure to restrict access to resources located within the web application.
An attacker could exploit this vulnerability to obtain configuration data
and other sensitive information.


Problem summary:
A resource ID string can be set on a resource URL. If a resource ID is
present, the default behavior of the GenericPortlet#serveResource method is
to dispatch to the resource identified by the resource ID through a request
dispatcher. The vulnerability can occur if an attacker manipulates the
resource ID field on a resource URL to point to a resource such as a JSP or
servlet that the user would not normally be able to access. Security
constraints can be bypassed in this manner.

Even portlets that do not use resource serving can be vulnerable if the
GenericPortlet#serveResource method is not overridden, since an attacker
could potentially add a resource ID to a resource URL. The resource ID
would be dispatched through the GenericPortlet#serveResource method.

Portlets that override the GenericPortlet#serveResource method and
either do not call the super.serveResource method or call it only after
verifying the resource ID are not vulnerable.
Comment 4 Chess Hazlett 2015-07-14 13:29:30 EDT
Statement:

CVE-2015-1926 did not affect JBoss Portal Platform as provided by Red Hat. For further detail, refer to the knowledge base article at https://access.redhat.com/solutions/1488163

Note You need to log in before you can comment on or make changes to this bug.