下面是原始网页http://seclists.org/oss-sec/2017/q2/31的快照。安全客与该网页作者无关,不对其内容负责。 刷新快照
oss-sec: [CVE-2016-6805] Arbitrary File Read due to eXternal Xml Entity attack in Apache Ignite
Home page logo

oss-sec mailing list archives

[CVE-2016-6805] Arbitrary File Read due to eXternal Xml Entity attack in Apache Ignite
From: Denis Magda <dmagda () apache org>
Date: Fri, 7 Apr 2017 12:29:13 -0400

[CVE-2016-6805] Arbitrary File Read due to eXternal Xml Entity attack in Apache Ignite

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Ignite 1.0.0-RC3 to 1.8

Description:
Apache Ignite uses an update notifier component to update the users about new project releases that include additional 
functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server 
(http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. This feature is 
enabled by default and used to send sensitive data over HTTP by mistake, such as installation folders or environment 
variables stored in Java system properties. The second issue is because TLS is not used between the application and the 
PHP server, a Man-in-the-middle attack is possible and a malicious actor could alter the response coming from the 
ignite.run server. This response is parsed by the Apache ignite component as XML, and a XXE attack can be triggered.

Both issues mentioned above were fixed as a part of Apache Ignite 1.9 release. The relevant commits with the changes:

Mitigation:
Users must upgrade to Apache Ignite 1.9 or later versions or disable the update notifier.

Credit:
Pierre Ernst, Salesforce





  By Date           By Thread  

Current thread:
  • [CVE-2016-6805] Arbitrary File Read due to eXternal Xml Entity attack in Apache Ignite Denis Magda (Apr 07)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]