Re: [CVE-2020-11991] Apache Cocoon security vulnerability

2020-09-11 Thread Cédric Damioli

Hi,

Entities resolution is managed by features of the SAX Parser, before any 
transformation.


Cédric

Le 11/09/2020 à 12:12, gelo1234 a écrit :


Hello Cedric,

Are external entities blocked also in XSLT?

Greetings,
Greg

pt., 11 wrz 2020 o 11:39 Cédric Damioli <mailto:cdami...@apache.org>> napisał(a):


[CVE-2020-11991] Apache Cocoon security vulnerability

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Cocoon up to 2.1.12

Description: When using the StreamGenerator, the code parse a
user-provided XML.

A specially crafted XML, including external system entities, could
be used to access any file on the server system.

Mitigation:

The StreamGenerator now ignores external entities. 2.1.x users
should upgrade to 2.1.13

Example:

With the following input :

  ]>  John
  an attacker got the content
of /etc/shadow

Credit: This issue was discovered by Nassim Asrir.


Regards,

-- 
Cédric Damioli




--
Cédric Damioli
CMS - Java - Open Source
www.ametys.org



Re: [CVE-2020-11991] Apache Cocoon security vulnerability

2020-09-11 Thread gelo1234
Hello Cedric,

Are external entities blocked also in XSLT?

Greetings,
Greg

pt., 11 wrz 2020 o 11:39 Cédric Damioli  napisał(a):

> [CVE-2020-11991] Apache Cocoon security vulnerability
>
> Severity: Important
>
> Vendor: The Apache Software Foundation
>
> Versions Affected: Apache Cocoon up to 2.1.12
>
> Description: When using the StreamGenerator, the code parse a
> user-provided XML.
>
> A specially crafted XML, including external system entities, could be used
> to access any file on the server system.
>
> Mitigation:
>
> The StreamGenerator now ignores external entities. 2.1.x users should
> upgrade to 2.1.13
>
> Example:
>
> With the following input :
>
>   "file:///etc/shadow"> ]>  John
>   an attacker got the content of
> /etc/shadow
>
> Credit: This issue was discovered by Nassim Asrir.
>
> Regards,
>
> --
> Cédric Damioli
>
>


[CVE-2020-11991] Apache Cocoon security vulnerability

2020-09-11 Thread Cédric Damioli

[CVE-2020-11991] Apache Cocoon security vulnerability

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Cocoon up to 2.1.12

Description: When using the StreamGenerator, the code parse a 
user-provided XML.


A specially crafted XML, including external system entities, could be 
used to access any file on the server system.


Mitigation:

The StreamGenerator now ignores external entities. 2.1.x users should 
upgrade to 2.1.13


Example:

With the following input :

 "file:///etc/shadow"> ]>  John 
  an attacker got the content of 
/etc/shadow


Credit: This issue was discovered by Nassim Asrir.


Regards,

--
Cédric Damioli