Bug 973474 - (CVE-2013-1571) CVE-2013-1571 OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)
CVE-2013-1571 OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20130618,repor...
: Security
Depends On:
Blocks: 973111 973116 973494 973505
  Show dependency treegraph
 
Reported: 2013-06-11 22:21 EDT by David Jorm
Modified: 2015-07-31 08:07 EDT (History)
12 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-08-02 10:39:52 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description David Jorm 2013-06-11 22:21:40 EDT
It was found that documentation generated by javadoc was vulnerable to a frame injection attack. If such documentation was accessible over a network, and a remote attacker could trick a user into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of the user's session if permitted by the browser. It could also be used to perform a phishing attack, by providing frame content that spoofed a login form on the site hosting the vulnerable documentation.
Comment 2 Murray McAllister 2013-06-18 06:27:17 EDT
Acknowledgements:

Red Hat would like to thank US-CERT for reporting this issue. US-CERT acknowledges Oracle as the original reporter.
Comment 4 Tomas Hoger 2013-06-18 16:05:48 EDT
Public now via Oracle Java SE CPU June 2013:
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html

Fixed available in Oracle Java SE 7u45.

CERT vulnerability note VU#225657:
http://www.kb.cert.org/vuls/id/225657

Oracle has made a Java API Documentation Updater Tool available that can be used to fix generated Javadoc documentation without regenerating it:
http://www.oracle.com/technetwork/java/javase/7u25-relnotes-1955741.html#jpi-upt
http://www.oracle.com/technetwork/java/javase/downloads/java-doc-updater-tool-1955731.html
Comment 5 errata-xmlrpc 2013-06-19 20:04:35 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:0958 https://rhn.redhat.com/errata/RHSA-2013-0958.html
Comment 6 errata-xmlrpc 2013-06-19 20:09:00 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:0957 https://rhn.redhat.com/errata/RHSA-2013-0957.html
Comment 7 Stefan Cornelius 2013-06-20 08:34:03 EDT
OpenJDK7 upstream repositories commit:

http://hg.openjdk.java.net/jdk7u/jdk7u-dev/langtools/rev/17ee569d0c01
Comment 10 errata-xmlrpc 2013-06-20 10:56:36 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2013:0963 https://rhn.redhat.com/errata/RHSA-2013-0963.html
Comment 12 Vincent Danen 2013-06-21 10:30:48 EDT
Users of libreoffice-sdk-doc are also affected by this flaw, if they serve these files via a web server.  Apache OpenOffice has provided a replacement index.html for /usr/lib/libreoffice/sdk/docs/java/ref/index.html (the path of the vulnerable index.html in 32bit Fedora installations); of course their index.html is meant for OpenOffice.org as opposed to LibreOffice.

http://www.openoffice.org/security/cves/CVE-2013-1571.html
Comment 15 errata-xmlrpc 2013-07-03 13:10:40 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2013:1014 https://rhn.redhat.com/errata/RHSA-2013-1014.html
Comment 17 errata-xmlrpc 2013-07-15 16:42:15 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2013:1060 https://rhn.redhat.com/errata/RHSA-2013-1060.html
Comment 18 errata-xmlrpc 2013-07-15 16:51:13 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2013:1059 https://rhn.redhat.com/errata/RHSA-2013-1059.html
Comment 19 Jan Lieskovsky 2013-07-16 04:55:35 EDT
Apache Ant upstream has released 1.9.2 version:
  [1] http://ant.apache.org/antnews.html

which between other changes also introduces mitigation for CVE-2013-1571 flaw:
[2] http://www.apache.org/dist/ant/RELEASE-NOTES-1.9.2.html
[3] https://issues.apache.org/bugzilla/show_bug.cgi?id=55132

Relevant patch being:
[4] http://svn.apache.org/viewvc?view=revision&revision=1496083
Comment 20 errata-xmlrpc 2013-07-16 13:23:49 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2013:1081 https://rhn.redhat.com/errata/RHSA-2013-1081.html
Comment 25 errata-xmlrpc 2013-10-23 12:42:45 EDT
This issue has been addressed in following products:

  Red Hat Network Satellite Server v 5.5

Via RHSA-2013:1456 https://rhn.redhat.com/errata/RHSA-2013-1456.html
Comment 26 errata-xmlrpc 2013-10-23 12:53:50 EDT
This issue has been addressed in following products:

  Red Hat Network Satellite Server v 5.4

Via RHSA-2013:1455 https://rhn.redhat.com/errata/RHSA-2013-1455.html
Comment 27 errata-xmlrpc 2014-04-17 07:33:07 EDT
This issue has been addressed in following products:

  Oracle Java for Red Hat Enterprise Linux 6
  Oracle Java for Red Hat Enterprise Linux 5

Via RHSA-2014:0414 https://rhn.redhat.com/errata/RHSA-2014-0414.html

Note You need to log in before you can comment on or make changes to this bug.