On Wednesday 16 June 2010 10:00:03 pm Nikolay Elenkov wrote:
> On 2010/06/17 0:29, Daniel Kulp wrote:
> > The Apache CXF team recently discovered a security issue that may allow
> > an attacker to carry out denial of service attacks and to read arbitrary
> > files on the file system of the node where CXF runs. Details of the
> > vulnerability are described in the following advisory:
> > 
> > http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf
> 
> I know it is better to upgrade, but just to confirm, are we OK if we are
> using only SOAP binding
> (@BindingType("http://schemas.xmlsoap.org/wsdl/soap/http";))? I did test it
> with the example exploits in the advisory, and it doesn't seem to be
> vulnerable, but could you confirm?

It MAY be vulnerable depending on the Stax parser that's being picked up.   In 
particular, the stuff in section 5.2 of the advisory could be a problem.  For 
example:


<!DOCTYPE Envelope SYSTEM "http://www.google.com/search?q=test";>
<soap:Envelope>......</soap:Envelope>

MAY result in the parser calling off to google prior to us being able to send 
the fault back due to the DTD being there.   The parser may process the DTD 
prior to us getting the event that it is there.    I don't really know what 
kind of problems being able to do a "get" on a URL from within Java can 
produce.   Possibly a DOS if they send enough requests to tie up network 
resources.   I don't really know.   That said, it also depends on the parser.   
The parser may or may not process the DTD prior to the event.   I don't really 
know which do and which don't.


I don't believe the stuff in section 5.1 and 5.3 are a problem as we would 
fault out prior to any entities being expanded and data being exposed.  


-- 
Daniel Kulp
dk...@apache.org
http://dankulp.com/blog

Reply via email to