Steve,

See http://marc.theaimsgroup.com/?l=axis-dev&m=103601859604566&w=2 for my fixes and 
test cases. 

Thanks,
dims

--- Steve Loughran <[EMAIL PROTECTED]> wrote:
> 
> ----- Original Message -----
> From: <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Wednesday, October 30, 2002 2:39 PM
> Subject: DO NOT REPLY [Bug 14105] New: - axis is vulnerable to XXE
> > Details:
> >  External entity references allow embedding data outside the main file
> into
> >  an XML document. In the DTD, one declares the external reference with the
> >  following syntax:
> >   <!ENTITY name SYSTEM "URI">
> >
> >  XML processor behavior as specified is
> >  [http://www.w3.org/TR/REC-xml#include-if-valid]:
> 
> 
> ha.
> 
> I've discussed this in terms of xlink and xsd import attacks in
> http://www.iseran.com/Steve/papers/when_web_services_go_bad.html
> and more broadly http://www.iseran.com/Steve/papers/wstw/ Web Services that
> Work. Guess I should have explored axis more.
> 
> 
> > Successful exploitation may yield:
> >  * DoS on the parsing system by making it open, e.g.
> >    file:///dev/random | file:///dev/urandom | file://c:/con/con
> >  * TCP scans using HTTP external entities (including behind firewalls
> >    since application servers often have world view different
> >    from that of the attacker)
> >  * Unauthorized access to data stored as XML files on the parsing
> >    system file system (of course the attacker still needs a way to
> >    get these data back)
> 
> actually if you can do entitity expansion you can get any text file into the
> text body of a message, that being easier to echo.
> 
> > Java:
> >   Apache XML-RPC server is NOT vulnerable in the default configuration
> >   due to its use of MinML parser which doesn't support external entities.
> >   Yet should be vulnerable if used with a full blown parser like Xerces
> >   or Crimson. To make it invulnerable in all configurations it needs to
> >   explicitly setup an EntityResolver that aborts having found external
> >   entities.
> 
> We have fun here as we are dependent upon bundled parsers, How do we turn
> off entity resolution in SAX?
> 
> > Acknowledgments:
> >  Even though the issue was discovered and researched independently I
> >  cannot claim to be the first one to realize the risks associated with
> >  XML external entities. E.g. RFC 2518 discusses the issue in section
> >  17.7 Implications of XML External Entities.
> 
> yes, I've been aware of it for a while, I just never did the experiments.
> 
> 
> > -----BEGIN PGP SIGNATURE-----
> > Version: GnuPG v1.0.6 (OpenBSD)
> > Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard
> <http://www.gnupg.org/>
> >
> > iEYEARECAAYFAj2/FZkACgkQCxVCvY31obB6vQCbBlV+v0jDRQQ7GcNxYRtajtAf
> > FxUAnRCDfjLy2692iGF3Ewmxzo/VXYmz
> > =t4QF
> > -----END PGP SIGNATURE-----
> >
> ============================================================================
> >
> 


=====
Davanum Srinivas - http://xml.apache.org/~dims/

__________________________________________________
Do you Yahoo!?
HotJobs - Search new jobs daily now
http://hotjobs.yahoo.com/

Reply via email to