Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1233687 - (CVE-2015-4806) CVE-2015-4806 OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193)
CVE-2015-4806 OpenJDK: HttpURLConnection header restriction bypass (Libraries...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20151020,repor...
: Security
Depends On:
Blocks: 1257667
  Show dependency treegraph
 
Reported: 2015-06-19 08:23 EDT by Tomas Hoger
Modified: 2016-11-08 11:25 EST (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-11-26 10:23:33 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1919 normal SHIPPED_LIVE Important: java-1.8.0-openjdk security update 2015-10-21 21:07:59 EDT
Red Hat Product Errata RHSA-2015:1920 normal SHIPPED_LIVE Critical: java-1.7.0-openjdk security update 2015-10-21 20:57:50 EDT
Red Hat Product Errata RHSA-2015:1921 normal SHIPPED_LIVE Important: java-1.7.0-openjdk security update 2015-10-21 18:47:05 EDT
Red Hat Product Errata RHSA-2015:1926 normal SHIPPED_LIVE Critical: java-1.8.0-oracle security update 2017-12-15 10:33:26 EST
Red Hat Product Errata RHSA-2015:1927 normal SHIPPED_LIVE Critical: java-1.7.0-oracle security update 2017-12-15 10:33:43 EST
Red Hat Product Errata RHSA-2015:1928 normal SHIPPED_LIVE Important: java-1.6.0-sun security update 2017-12-15 10:32:47 EST
Red Hat Product Errata RHSA-2015:2086 normal SHIPPED_LIVE Important: java-1.6.0-openjdk security update 2015-11-18 16:40:11 EST
Red Hat Product Errata RHSA-2015:2506 normal SHIPPED_LIVE Critical: java-1.7.1-ibm security update 2015-11-23 12:56:27 EST
Red Hat Product Errata RHSA-2015:2507 normal SHIPPED_LIVE Critical: java-1.7.0-ibm security update 2015-11-23 12:40:46 EST
Red Hat Product Errata RHSA-2015:2508 normal SHIPPED_LIVE Critical: java-1.6.0-ibm security update 2015-11-23 12:39:17 EST
Red Hat Product Errata RHSA-2015:2509 normal SHIPPED_LIVE Critical: java-1.8.0-ibm security update 2015-11-23 12:56:18 EST
Red Hat Product Errata RHSA-2015:2518 normal SHIPPED_LIVE Important: java-1.5.0-ibm security update 2015-11-25 21:15:42 EST
Red Hat Product Errata RHSA-2016:1430 normal SHIPPED_LIVE Moderate: java-1.7.0-ibm and java-1.7.1-ibm security update 2016-07-18 13:51:35 EDT

  None (edit)
Description Tomas Hoger 2015-06-19 08:23:01 EDT
Andrea Palazzo reported the following problem affecting IcedTea-Web:

"""
Using HTTPUrlConnection it is possible to set custom values for blacklisted headers, even if allowRestrictedHeaders is false, by supplying "Name:value" as name.

Also, if needed, trailing ":" could be stripped off using an array as header value.
"""

Acknowledgement:

Red Hat would like to thank Andrea Palazzo of Truel IT for reporting this issue.
Comment 2 jiri vanek 2015-06-20 15:10:48 EDT
I'm litle bit hesitating what fix can be. To disable exactly header param? To verify it do not contain ":" or to pass only known params to url connection (or filter some known params out of it...) Thoughts?
Comment 3 jiri vanek 2015-06-23 05:33:57 EDT
Hello!

I'm unable to reproduce. Nowhere in ITW is called addRequestProperty with different then Accept-Encoding  param.
Comment 4 Tomas Hoger 2015-06-23 18:14:47 EDT
HttpURLConnection already defines a set of "restricted headers", which can not be set for HTTP connection.  This header restriction is enforced for sandboxed code.  The feature was added via:

http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/e0806d924a42

which is a fix for CVE-2010-3541 and CVE-2010-3573 (bug 642202).

Reported attack vector is blocked in JDK8 in URLPermission, where header name containing colon triggers error.

Related changes in JDK8:

http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/93a268759ec3
https://bugs.openjdk.java.net/browse/JDK-8010464
https://bugs.openjdk.java.net/browse/JDK-8046174
http://openjdk.java.net/jeps/184

http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/dd0deeb04933
https://bugs.openjdk.java.net/browse/JDK-8014719

Backporting whole JEP 184 to JDK7 and earlier is probably not an option.  Alternative to that may be performing following checks when header restrictions are enforced:

- ensure header name does not contain colon
- ensure header value is not null
Comment 6 Tomas Hoger 2015-07-02 08:44:37 EDT
This issue was reported upstream (Oracle) and got tracking id S0586943.  Issue is expected to be corrected in future updates.
Comment 7 Tomas Hoger 2015-10-18 17:13:31 EDT
The issue is being fixed in Oct 2015 CPU.
Comment 8 Tomas Hoger 2015-10-21 04:48:56 EDT
Public now via Oracle Critical Patch Update - October 2015.  Fixed in Oracle Java SE 6u105, 7u91, and 8u65.

External References:

http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html#AppendixJAVA
Comment 9 Tomas Hoger 2015-10-21 07:46:08 EDT
OpenJDK 8 upstream commit:

http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/c00bcb8d4596
Comment 10 errata-xmlrpc 2015-10-21 14:47:27 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2015:1921 https://rhn.redhat.com/errata/RHSA-2015-1921.html
Comment 11 errata-xmlrpc 2015-10-21 16:58:57 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2015:1920 https://rhn.redhat.com/errata/RHSA-2015-1920.html
Comment 12 errata-xmlrpc 2015-10-21 17:08:16 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2015:1919 https://rhn.redhat.com/errata/RHSA-2015-1919.html
Comment 13 errata-xmlrpc 2015-10-22 14:34:46 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 7
  Oracle Java for Red Hat Enterprise Linux 5
  Oracle Java for Red Hat Enterprise Linux 6

Via RHSA-2015:1928 https://rhn.redhat.com/errata/RHSA-2015-1928.html
Comment 14 errata-xmlrpc 2015-10-22 14:36:11 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 7
  Oracle Java for Red Hat Enterprise Linux 6

Via RHSA-2015:1926 https://rhn.redhat.com/errata/RHSA-2015-1926.html
Comment 15 errata-xmlrpc 2015-10-22 14:45:00 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 7
  Oracle Java for Red Hat Enterprise Linux 5
  Oracle Java for Red Hat Enterprise Linux 6

Via RHSA-2015:1927 https://rhn.redhat.com/errata/RHSA-2015-1927.html
Comment 16 errata-xmlrpc 2015-11-18 11:40:48 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2015:2086 https://rhn.redhat.com/errata/RHSA-2015-2086.html
Comment 17 errata-xmlrpc 2015-11-23 07:40:58 EST
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2015:2508 https://rhn.redhat.com/errata/RHSA-2015-2508.html
Comment 18 errata-xmlrpc 2015-11-23 07:42:55 EST
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2015:2507 https://rhn.redhat.com/errata/RHSA-2015-2507.html
Comment 19 errata-xmlrpc 2015-11-23 07:56:49 EST
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 7

Via RHSA-2015:2509 https://rhn.redhat.com/errata/RHSA-2015-2509.html
Comment 20 errata-xmlrpc 2015-11-23 08:00:48 EST
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 7

Via RHSA-2015:2506 https://rhn.redhat.com/errata/RHSA-2015-2506.html
Comment 21 errata-xmlrpc 2015-11-25 16:16:36 EST
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2015:2518 https://rhn.redhat.com/errata/RHSA-2015-2518.html
Comment 22 errata-xmlrpc 2016-07-18 09:53:35 EDT
This issue has been addressed in the following products:

  Red Hat Satellite 5.6
  Red Hat Satellite 5.7

Via RHSA-2016:1430 https://access.redhat.com/errata/RHSA-2016:1430

Note You need to log in before you can comment on or make changes to this bug.