SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   JBoss Vendors:   Red Hat
JBoss Enterprise Application Platform Discloses XML Files to Remote Users
SecurityTracker Alert ID:  1021817
SecurityTracker URL:  http://securitytracker.com/id/1021817
CVE Reference:   CVE-2009-0027   (Links to External Site)
Date:  Mar 6 2009
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.2, 4.3
Description:   A vulnerability was reported in JBoss Enterprise Application Platform. A remote user can view certain files on the target system.

The JBossWS request handler does not properly validate the resource path specified in user-supplied input. A remote user can supply a specially crafted request to view XML files on target system with the privileges of the JBoss EAP process.

Impact:   A remote user can view XML files on the target system with the privileges of the JBoss EAP process.
Solution:   The vendor has issued a fix.

The vendor's advisories are available at:

https://rhn.redhat.com/errata/RHSA-2009-0346.html
https://rhn.redhat.com/errata/RHSA-2009-0347.html
https://rhn.redhat.com/errata/RHSA-2009-0348.html
https://rhn.redhat.com/errata/RHSA-2009-0349.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2009-0346.html (Links to External Site)
Cause:   Input validation error
Underlying OS:   Linux (Red Hat Enterprise)

Message History:   None.


 Source Message Contents

Date:  Fri, 6 Mar 2009 14:12:44 -0500
Subject:  [RHSA-2009:0346-01] Moderate: JBoss Enterprise Application Platform

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: JBoss Enterprise Application Platform 4.2.0CP06 update
Advisory ID:       RHSA-2009:0346-01
Product:           JBoss Enterprise Application Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2009-0346.html
Issue date:        2009-03-06
CVE Names:         CVE-2009-0027 
=====================================================================

1. Summary:

Updated JBoss Enterprise Application Platform (JBoss EAP) 4.2 packages that
fix various issues are now available for Red Hat Enterprise Linux 4 as
JBEAP 4.2.0.CP06.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

JBoss Enterprise Application Platform for RHEL 4 AS - i386, noarch, x86_64
JBoss Enterprise Application Platform for RHEL 4 ES - i386, noarch, x86_64

3. Description:

JBoss Enterprise Application Platform (JBoss EAP) is the market-leading
platform for innovative and scalable Java applications. JBoss EAP
integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam
into a complete, simple enterprise solution.

This release of JBoss EAP for Red Hat Enterprise Linux 4 serves as a
replacement to JBEAP 4.2.0.CP05.

These updated packages include bug fixes and enhancements which are
detailed in the release notes. The link to the release notes is available
below in the References section.

The following security issue is also fixed with this release:

The request handler in JBossWS did not correctly verify the resource path
when serving WSDL files for custom web service endpoints. This allowed
remote attackers to read arbitrary XML files with the permissions of the
EAP processs. (CVE-2009-0027)

Warning: before applying this update, please backup the JBoss EAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.

All users of JBoss EAP 4.2 on Red Hat Enterprise Linux 4 are advised to
upgrade to these updated packages, which resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

474619 - Tracker bug for the EAP 4.2.0.cp06 release.
479668 - CVE-2009-0027 JBoss EAP unprivileged local xml file access

6. Package List:

JBoss Enterprise Application Platform for RHEL 4 AS:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/glassfish-jsf-1.2_10-0jpp.ep1.5.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/hibernate3-3.2.4-1.SP1_CP07.0jpp.ep1.14.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jacorb-2.3.0-1jpp.ep1.7.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jakarta-commons-beanutils-1.8.0-3.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jakarta-commons-fileupload-1.1.1-3jpp.ep1.2.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jakarta-commons-io-1.1-0.20051005.2jpp_1rh.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jakarta-commons-logging-jboss-1.1-4.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-cache-1.4.1-6.SP11.1.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-jaxr-1.2.0-SP2.0jpp.ep1.3.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-remoting-2.2.2-3.SP11.0jpp.ep1.1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-seam-1.2.1-1.ep1.18.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-vfs-1.0.0-1.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossas-4.2.0-4.GA_CP06.3.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossts-4.2.3-1.SP5_CP04.1jpp.ep1.1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossweb-2.0.0-6.CP09.0jpp.ep1.1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jgroups-2.4.5-2.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/rh-eap-docs-4.2.0-5.GA_CP06.ep1.3.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/tanukiwrapper-3.2.1-2jpp.ep1.2.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/ws-commons-policy-1.0-2jpp.ep1.7.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/ws-scout0-0.7-0.rc2.4.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/xalan-j2-2.7.0-2jpp.ep1.5.el4.src.rpm

i386:
tanukiwrapper-3.2.1-2jpp.ep1.2.el4.i386.rpm
tanukiwrapper-debuginfo-3.2.1-2jpp.ep1.2.el4.i386.rpm

noarch:
glassfish-jsf-1.2_10-0jpp.ep1.5.ep5.el4.noarch.rpm
hibernate3-3.2.4-1.SP1_CP07.0jpp.ep1.14.el4.noarch.rpm
hibernate3-javadoc-3.2.4-1.SP1_CP07.0jpp.ep1.14.el4.noarch.rpm
jacorb-2.3.0-1jpp.ep1.7.el4.noarch.rpm
jakarta-commons-beanutils-1.8.0-3.ep5.el4.noarch.rpm
jakarta-commons-fileupload-1.1.1-3jpp.ep1.2.el4.noarch.rpm
jakarta-commons-io-1.1-0.20051005.2jpp_1rh.noarch.rpm
jakarta-commons-logging-jboss-1.1-4.ep1.el4.noarch.rpm
jboss-cache-1.4.1-6.SP11.1.ep1.el4.noarch.rpm
jboss-jaxr-1.2.0-SP2.0jpp.ep1.3.el4.noarch.rpm
jboss-remoting-2.2.2-3.SP11.0jpp.ep1.1.el4.noarch.rpm
jboss-seam-1.2.1-1.ep1.18.el4.noarch.rpm
jboss-seam-docs-1.2.1-1.ep1.18.el4.noarch.rpm
jboss-vfs-1.0.0-1.ep1.el4.noarch.rpm
jbossas-4.2.0-4.GA_CP06.3.ep1.el4.noarch.rpm
jbossas-4.2.0.GA_CP06-bin-4.2.0-4.GA_CP06.3.ep1.el4.noarch.rpm
jbossas-client-4.2.0-4.GA_CP06.3.ep1.el4.noarch.rpm
jbossts-4.2.3-1.SP5_CP04.1jpp.ep1.1.el4.noarch.rpm
jbossweb-2.0.0-6.CP09.0jpp.ep1.1.el4.noarch.rpm
jgroups-2.4.5-2.ep1.el4.noarch.rpm
rh-eap-docs-4.2.0-5.GA_CP06.ep1.3.el4.noarch.rpm
rh-eap-docs-examples-4.2.0-5.GA_CP06.ep1.3.el4.noarch.rpm
ws-commons-policy-1.0-2jpp.ep1.7.el4.noarch.rpm
ws-scout0-0.7-0.rc2.4.el4.noarch.rpm
xalan-j2-2.7.0-2jpp.ep1.5.el4.noarch.rpm

x86_64:
tanukiwrapper-3.2.1-2jpp.ep1.2.el4.x86_64.rpm
tanukiwrapper-debuginfo-3.2.1-2jpp.ep1.2.el4.x86_64.rpm

JBoss Enterprise Application Platform for RHEL 4 ES:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/glassfish-jsf-1.2_10-0jpp.ep1.5.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/hibernate3-3.2.4-1.SP1_CP07.0jpp.ep1.14.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jacorb-2.3.0-1jpp.ep1.7.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jakarta-commons-beanutils-1.8.0-3.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jakarta-commons-fileupload-1.1.1-3jpp.ep1.2.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jakarta-commons-io-1.1-0.20051005.2jpp_1rh.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jakarta-commons-logging-jboss-1.1-4.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-cache-1.4.1-6.SP11.1.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-jaxr-1.2.0-SP2.0jpp.ep1.3.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-remoting-2.2.2-3.SP11.0jpp.ep1.1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-seam-1.2.1-1.ep1.18.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-vfs-1.0.0-1.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossas-4.2.0-4.GA_CP06.3.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossts-4.2.3-1.SP5_CP04.1jpp.ep1.1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossweb-2.0.0-6.CP09.0jpp.ep1.1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jgroups-2.4.5-2.ep1.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/rh-eap-docs-4.2.0-5.GA_CP06.ep1.3.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/tanukiwrapper-3.2.1-2jpp.ep1.2.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/ws-commons-policy-1.0-2jpp.ep1.7.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/ws-scout0-0.7-0.rc2.4.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/xalan-j2-2.7.0-2jpp.ep1.5.el4.src.rpm

i386:
tanukiwrapper-3.2.1-2jpp.ep1.2.el4.i386.rpm
tanukiwrapper-debuginfo-3.2.1-2jpp.ep1.2.el4.i386.rpm

noarch:
glassfish-jsf-1.2_10-0jpp.ep1.5.ep5.el4.noarch.rpm
hibernate3-3.2.4-1.SP1_CP07.0jpp.ep1.14.el4.noarch.rpm
hibernate3-javadoc-3.2.4-1.SP1_CP07.0jpp.ep1.14.el4.noarch.rpm
jacorb-2.3.0-1jpp.ep1.7.el4.noarch.rpm
jakarta-commons-beanutils-1.8.0-3.ep5.el4.noarch.rpm
jakarta-commons-fileupload-1.1.1-3jpp.ep1.2.el4.noarch.rpm
jakarta-commons-io-1.1-0.20051005.2jpp_1rh.noarch.rpm
jakarta-commons-logging-jboss-1.1-4.ep1.el4.noarch.rpm
jboss-cache-1.4.1-6.SP11.1.ep1.el4.noarch.rpm
jboss-jaxr-1.2.0-SP2.0jpp.ep1.3.el4.noarch.rpm
jboss-remoting-2.2.2-3.SP11.0jpp.ep1.1.el4.noarch.rpm
jboss-seam-1.2.1-1.ep1.18.el4.noarch.rpm
jboss-seam-docs-1.2.1-1.ep1.18.el4.noarch.rpm
jboss-vfs-1.0.0-1.ep1.el4.noarch.rpm
jbossas-4.2.0-4.GA_CP06.3.ep1.el4.noarch.rpm
jbossas-4.2.0.GA_CP06-bin-4.2.0-4.GA_CP06.3.ep1.el4.noarch.rpm
jbossas-client-4.2.0-4.GA_CP06.3.ep1.el4.noarch.rpm
jbossts-4.2.3-1.SP5_CP04.1jpp.ep1.1.el4.noarch.rpm
jbossweb-2.0.0-6.CP09.0jpp.ep1.1.el4.noarch.rpm
jgroups-2.4.5-2.ep1.el4.noarch.rpm
rh-eap-docs-4.2.0-5.GA_CP06.ep1.3.el4.noarch.rpm
rh-eap-docs-examples-4.2.0-5.GA_CP06.ep1.3.el4.noarch.rpm
ws-commons-policy-1.0-2jpp.ep1.7.el4.noarch.rpm
ws-scout0-0.7-0.rc2.4.el4.noarch.rpm
xalan-j2-2.7.0-2jpp.ep1.5.el4.noarch.rpm

x86_64:
tanukiwrapper-3.2.1-2jpp.ep1.2.el4.x86_64.rpm
tanukiwrapper-debuginfo-3.2.1-2jpp.ep1.2.el4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0027
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp06/html-single/readme/index.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFJsXWkXlSAg2UNWIIRAkzHAJ44ORPcEY/0PiSjaMLUagIfEQYq0QCeKjvl
Dy/EDqU9YPwws49bJgx+qgE=
=9SzC
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC