Author: taylor
Date: Thu Mar 3 20:54:49 2016
New Revision: 1733520
URL: http://svn.apache.org/viewvc?rev=1733520&view=rev
Log:
adding Security Reports to site. Updating Roadmap
Added:
portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/security-reports.xml
- copied, changed from r1693286,
portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/roadmap.xml
Modified:
portals/site/jetspeed/jetspeed-2.3/src/site/site.xml
portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/roadmap.xml
Modified: portals/site/jetspeed/jetspeed-2.3/src/site/site.xml
URL:
http://svn.apache.org/viewvc/portals/site/jetspeed/jetspeed-2.3/src/site/site.xml?rev=1733520&r1=1733519&r2=1733520&view=diff
==============================================================================
--- portals/site/jetspeed/jetspeed-2.3/src/site/site.xml (original)
+++ portals/site/jetspeed/jetspeed-2.3/src/site/site.xml Thu Mar 3 20:54:49
2016
@@ -44,6 +44,7 @@
<item name="Getting Started" href="getting-started.html" />
<!--<item name="Online Demos" href="demo.html"/>-->
<item name="Roadmap" href="roadmap.html" />
+ <item name="Security Reports" href="security-reports.html" />
</menu>
<menu name="Get Jetspeed">
Modified: portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/roadmap.xml
URL:
http://svn.apache.org/viewvc/portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/roadmap.xml?rev=1733520&r1=1733519&r2=1733520&view=diff
==============================================================================
--- portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/roadmap.xml (original)
+++ portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/roadmap.xml Thu Mar 3
20:54:49 2016
@@ -17,55 +17,60 @@
-->
<document>
<properties>
- <title>Jetspeed Roadmap</title>
- <subtitle>Roadmap</subtitle>
- <authors>
- <person name="David Sean Taylor" email="[email protected]" />
- </authors>
+ <title>Jetspeed Roadmap</title>
+ <subtitle>Roadmap</subtitle>
+ <authors>
+ <person name="David Sean Taylor" email="[email protected]"/>
+ </authors>
</properties>
<body>
- <section name="Upcoming Releases Timeline">
+ <section name="Upcoming Releases Timeline">
<ul>
- <li>2.3.0 - July 2015</li>
- <li>2.3.1 - January 2016</li>
+ <li>2.3.1 - February 2016</li>
</ul>
</section>
- <section name="2.3.0 Release">
- <p>The theme of this release is to get back on track with the latest
versions of Java, Servlet Containers, Maven</p>
- <ul>
- <li>Java 1.7 Support(JS2-1292)</li>
- <li>Jetspeed API + Generics (JS2-874)</li>
- <li>Tomcat7 and Servlet 3.0 (JS2-1274)</li>
- <li>Upgrade Dependencies, Spring (JS2-1290)</li>
- <li>New Responsive Decorators (JS2-1314)</li>
- <li>New Responsive Layout (JS2-1315)</li>
- <li>J2-Admin Angular Portlet Framework (JS2-1316)</li>
- <li>J2-Admin Core Portlets Responsive (JS2-1317)</li>
- <li>J2-Admin Chart Portlets (JS2-1320)</li>
- <li>New User Manager (JS2-1293)</li>
- <li>Preferences Performance Improvements (JS2-1325)</li>
- <li>Security Performance Improvements (JS2-1324)</li>
- <li>Upgraded Portals APA and Bridges Dependencies</li>
- </ul>
- </section>
- <section name ="2.3.1 Release">
- <p>The theme of this release is to continue to improve the user
interface experience</p>
- <ul>
- <li>Continue Admin Portlets Upgrades (JS2-1282)</li>
- <li>Customization Improvements (JS2-1084)</li>
- <li>Deprecate old Decorators, Layouts. Make Responsive Default
Layouts and Decorators</li>
- <li>Security Domains (JS2-1233)</li>
- <li>Maven Improvements (JS2-1291)</li>
- </ul>
+ <section name="2.3.1 Release">
+ <p>The theme of this release is to continue to improve the user
interface experience</p>
+ <ul>
+ <li><a href="security-reports.html">Apache Security CVE Fixes
to 2.3.0</a></li>
+ <li><a
href="https://issues.apache.org/jira/browse/JS2-1348">Search Feature
(JS2-1348)</a></li>
+ <li><a
href="https://issues.apache.org/jira/browse/JS2-1341">Detached Portlets
(JS2-1341)</a></li>
+ <li><a
href="https://issues.apache.org/jira/browse/JS2-1342">Update Archetype and
Tutorial (JS2-1342)</a></li>
+ <li><a
href="https://issues.apache.org/jira/browse/JS2-1349">User Admin, Filter by
Groups (JS2-1349)</a></li>
+ <li><a
href="https://issues.apache.org/jira/browse/JS2-1346">User Admin, Edit Email
field (JS2-1346)</a></li>
+ <li><a
href="https://issues.apache.org/jira/browse/JS2-1345">Improve CSS in Site
Manager and Constraints Admin (JS2-1345)</a></li>
+ <li><a
href="https://issues.apache.org/jira/browse/JS2-1340">Improvements to Standard
Portlet Decorators (JS2-1340)</a></li>
+
+<!--
+ <li>Content (JS2-)</li>
+ <li>Web Sockets (JS2-)</li>
+ <li>Backend Services</li>
+ <li>Continue Admin Portlets Upgrades (JS2-1282)</li>
+ <li>Customization Improvements (JS2-1084)</li>
+ <li>Security Domains (JS2-1233)</li>
+ <li>Maven Improvements (JS2-1291)</li>
+ <li>Jetspeed Service Annotations</li>
+ -->
+ </ul>
</section>
- <section name="Last Release">
- <p><a
href='http://portals.apache.org/jetspeed-2/features.html'>2.2.2</a>- released
October 2011</p>
+
+ <section name="Last Release 2.3.0">
+ <p>2.3.0 - released October 2011</p>
<ul>
- <li>Portlet Cloning</li>
- <li>Apache Solr based Search Engine</li>
- <li>Bulk Migration of DBPSML from 2.1.x to 2.2.x</li>
- <li>Admin Security and Portlet Level Security Improvements</li>
+ <li>Java 1.7 Support(JS2-1292)</li>
+ <li>Jetspeed API + Generics (JS2-874)</li>
+ <li>Tomcat7 and Servlet 3.0 (JS2-1274)</li>
+ <li>Upgrade Dependencies, Spring (JS2-1290)</li>
+ <li>New Responsive Decorators (JS2-1314)</li>
+ <li>New Responsive Layout (JS2-1315)</li>
+ <li>J2-Admin Angular Portlet Framework (JS2-1316)</li>
+ <li>J2-Admin Core Portlets Responsive (JS2-1317)</li>
+ <li>J2-Admin Chart Portlets (JS2-1320)</li>
+ <li>New User Manager (JS2-1293)</li>
+ <li>Preferences Performance Improvements (JS2-1325)</li>
+ <li>Security Performance Improvements (JS2-1324)</li>
+ <li>Upgraded Portals APA and Bridges Dependencies</li>
</ul>
</section>
Copied: portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/security-reports.xml
(from r1693286, portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/roadmap.xml)
URL:
http://svn.apache.org/viewvc/portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/security-reports.xml?p2=portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/security-reports.xml&p1=portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/roadmap.xml&r1=1693286&r2=1733520&rev=1733520&view=diff
==============================================================================
--- portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/roadmap.xml (original)
+++ portals/site/jetspeed/jetspeed-2.3/src/site/xdoc/security-reports.xml Thu
Mar 3 20:54:49 2016
@@ -17,56 +17,139 @@
-->
<document>
<properties>
- <title>Jetspeed Roadmap</title>
- <subtitle>Roadmap</subtitle>
- <authors>
- <person name="David Sean Taylor" email="[email protected]" />
- </authors>
+ <title>Jetspeed Security Reports</title>
+ <subtitle>Common Vulnerabilities and Exposures (CVE) Reports</subtitle>
+ <authors>
+ <person name="David Sean Taylor" email="[email protected]"/>
+ </authors>
</properties>
<body>
- <section name="Upcoming Releases Timeline">
- <ul>
- <li>2.3.0 - July 2015</li>
- <li>2.3.1 - January 2016</li>
- </ul>
- </section>
- <section name="2.3.0 Release">
- <p>The theme of this release is to get back on track with the latest
versions of Java, Servlet Containers, Maven</p>
- <ul>
- <li>Java 1.7 Support(JS2-1292)</li>
- <li>Jetspeed API + Generics (JS2-874)</li>
- <li>Tomcat7 and Servlet 3.0 (JS2-1274)</li>
- <li>Upgrade Dependencies, Spring (JS2-1290)</li>
- <li>New Responsive Decorators (JS2-1314)</li>
- <li>New Responsive Layout (JS2-1315)</li>
- <li>J2-Admin Angular Portlet Framework (JS2-1316)</li>
- <li>J2-Admin Core Portlets Responsive (JS2-1317)</li>
- <li>J2-Admin Chart Portlets (JS2-1320)</li>
- <li>New User Manager (JS2-1293)</li>
- <li>Preferences Performance Improvements (JS2-1325)</li>
- <li>Security Performance Improvements (JS2-1324)</li>
- <li>Upgraded Portals APA and Bridges Dependencies</li>
- </ul>
- </section>
-
- <section name ="2.3.1 Release">
- <p>The theme of this release is to continue to improve the user
interface experience</p>
+ <section name="CVE Reports">
<ul>
- <li>Continue Admin Portlets Upgrades (JS2-1282)</li>
- <li>Customization Improvements (JS2-1084)</li>
- <li>Deprecate old Decorators, Layouts. Make Responsive Default
Layouts and Decorators</li>
- <li>Security Domains (JS2-1233)</li>
- <li>Maven Improvements (JS2-1291)</li>
+ <li><a href='#CVE-2016-0709'>CVE-2016-0709: Code execution via ZIP
file path traversal</a></li>
+ <li><a href='#CVE-2016-0710'>CVE-2016-0710: SQL injection in User
Manager service</a></li>
+ <li><a href='#CVE-2016-0711'>CVE-2016-0711: Persistent Cross Site
Scripting in links, pages and folders</a></li>
+ <li><a href='#CVE-2016-0712'>CVE-2016-0712: Reflected Cross Site
Scripting in URI path</a></li>
</ul>
</section>
- <section name="Last Release">
- <p><a
href='http://portals.apache.org/jetspeed-2/features.html'>2.2.2</a>- released
October 2011</p>
- <ul>
- <li>Portlet Cloning</li>
- <li>Apache Solr based Search Engine</li>
- <li>Bulk Migration of DBPSML from 2.1.x to 2.2.x</li>
- <li>Admin Security and Portlet Level Security Improvements</li>
- </ul>
+ <section name="2.3.1 Release CVE Reports">
+ <a name="CVE-2016-0709"/>
+ <subsection name="CVE-2016-0709: Code execution via ZIP file path
traversal">
+ <table>
+ <tr><td>Severity: </td><td>Important</td></tr>
+ <tr><td>Vendor: </td><td>The Apache Software
Foundation</td></tr>
+ <tr><td>Versions Effected:</td><td> Jetspeed 2.2.0 to
2.2.2</td></tr>
+ <tr><td></td><td>Jetspeed 2.3.0</td></tr>
+ <tr><td>The unsupported Jetspeed 2.1.x versions may be also
affected</td></tr>
+ <tr><td>Mitigation:</td><td>2.2.0 - 2.3.0 users should upgrade
to 2.3.1</td></tr>
+ <tr><td>Credit:</td><td>This issue was discovered by
Andreas Lindh</td></tr>
+
<tr><td>References:</td><td>http://tomcat.apache.org/security.html</td></tr>
+ </table>
+
+ <h4>Description:</h4>
+ <p>The Import/Export function in the Portal Site Manager, part
of the Jetspeed Administrative Portlets, is vulnerable to a path traversal via
specially crafted file names in ZIP archives. Any user with permission to
upload files via this function can upload a file with a name like
"../../../../tmp/foo" to write a file named "foo" in the /tmp directory. This
is because the code that performs the unzipping of the archive does not check
the validity of the file names before writing them to disk. This can be turned
into code execution by uploading a .jsp file and writing it to somewhere on the
file system where the web server will execute it when visited
+ </p>
+ </subsection>
+ <a name="CVE-2016-0710"/>
+ <subsection name="#CVE-2016-0710: SQL injection in User Manager
service">
+ <table>
+ <tr><td>Severity: </td><td>Important</td></tr>
+ <tr><td>Vendor: </td><td>The Apache Software
Foundation</td></tr>
+ <tr><td>Versions Effected:</td><td> Jetspeed
2.3.0</td></tr>
+ <tr><td>Mitigation:</td><td>2.3.0 users should upgrade to
2.3.1</td></tr>
+ <tr><td>Credit:</td><td>This issue was discovered by
Andreas Lindh</td></tr>
+
<tr><td>References:</td><td>http://tomcat.apache.org/security.html</td></tr>
+ </table>
+
+ <h4>Description:</h4>
+ <p>The Jetspeed User Manager service, part of the Jetspeed
Administrative Portlets, is vulnerable to SQL injection. When performing a
search in these tools, the 'user' and 'role' parameters of the request can be
injected to alter the logic of the subsequent SQL statement.
+ </p>
+ <p>There is also an authorization flaw at play here since the
above URLs can be reached without being authenticated in Jetspeed.</p>
+ <h4>Example</h4>
+ <p>
+ Given this URL:<br/>
+
<source><![CDATA[http://192.168.2.4:8080/jetspeed/services/usermanager/users/?_type=json&results=10&start=0&sort=userName&dir=asc&name=&roles=foo%27%20]]></source>
+ The 'role' parameter contains the value "foo" which is not
an existing role, but because of the injected SQL code (or '1'='1') the
statement returns true anyway and all the existing users are shown.
+ </p>
+ </subsection>
+ <a name="CVE-2016-0711"/>
+ <subsection name="CVE-2016-0711: Persistent Cross Site Scripting
in links, pages and folders">
+ <table>
+ <tr><td>Severity: </td><td>Important</td></tr>
+ <tr><td>Vendor: </td><td>The Apache Software
Foundation</td></tr>
+ <tr><td>Versions Effected:</td><td> Jetspeed 2.2.0 to
2.2.2</td></tr>
+ <tr><td></td><td>Jetspeed 2.3.0</td></tr>
+ <tr><td>The unsupported Jetspeed 2.1.x versions may be
also affected</td></tr>
+ <tr><td>Mitigation:</td><td>2.2.0 - 2.3.0 users should
upgrade to 2.3.1</td></tr>
+ <tr><td>Credit:</td><td>This issue was discovered by
Andreas Lindh</td></tr>
+
<tr><td>References:</td><td>http://tomcat.apache.org/security.html</td></tr>
+ </table>
+
+ <h4>Description:</h4>
+ <p>The functionality to add a link, page, or folder, is
vulnerable to persistent Cross Site Scripting. This is because it is possible
to include HTML tags in the object's name, such as is the example below where a
page object is being renamed after creation.
+ </p>
+ <h4>Example</h4>
+ <p>
+ Given this AJAX request:<br/>
+ <source><![CDATA[
+POST /jetspeed/services/pagemanagement/info/.psml/_user/andreas/foobar.psml?
+_type=json HTTP/1.1
+Host: 192.168.2.4:8080
+User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:43.0) Gecko/20100101
+Firefox/43.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+X-Requested-With: XMLHttpRequest
+Content-Type: application/x-www-form-urlencoded; charset=UTF-8
+Referer: http://192.168.2.4:8080/jetspeed/ui/_user/andreas/foobar.psml
+Content-Length: 60
+Cookie: JSESSIONID=F95E2034A086BE172EF816FF2C853BE9;
+JS2TOOLBOX=TAB=theme&CAT=Administration
+Connection: close
+title=foobar</a></li><script>alert(document.domain)</script>
+ ]]></source>
+ </p>
+ <p>Which results in the following content in the server
response:<br/>
+ <source><![CDATA[
+<meta http-equiv="content-type" content="text/html; charset=UTF-8"/>
+<title>foobar</a></li><script>alert(document.domain)</script></title>
+ ]]></source>
+ <p>Note that this code will be executed every time someone visits
that space.</p>
+ </p>
+ </subsection>
+ <a name="CVE-2016-0712"/>
+ <subsection name="CVE-2016-0712: Reflected Cross Site Scripting in
URI path">
+ <table>
+ <tr><td>Severity: </td><td>Important</td></tr>
+ <tr><td>Vendor: </td><td>The Apache Software
Foundation</td></tr>
+ <tr><td>Versions Effected:</td><td> Jetspeed 2.2.0 to
2.2.2</td></tr>
+ <tr><td></td><td>Jetspeed 2.3.0</td></tr>
+ <tr><td>The unsupported Jetspeed 2.1.x versions may be also
affected</td></tr>
+ <tr><td>Mitigation:</td><td>2.2.0 - 2.3.0 users should upgrade
to 2.3.1</td></tr>
+ <tr><td>Credit:</td><td>This issue was discovered by
Andreas Lindh</td></tr>
+
<tr><td>References:</td><td>http://tomcat.apache.org/security.html</td></tr>
+ </table>
+
+ <h4>Description:</h4>
+ <p>
+ The URI path directory after /portal is vulnerable to
reflected Cross Site Scripting. By visiting the following URL, a JavaScript
pop-up will appear when the mouse is moved over the minimize/maximize buttons
(may differ for different UI versions).
+ Note this issue is only reproduced on Firefox browser.
+ </p>
+ <h4>Example</h4>
+ <p>
+ Given this URL:<br/>
+ <source><![CDATA[
+http://192.168.2.9:8080/jetspeed/portal/foo%22onmouseover%3d%22alert%281%29?URL=foo/bar
+ ]]></source>
+ </p>
+ <p>In the HTML response there is script:<br/>
+ <source><![CDATA[
+<a
href="http://192.168.2.4:8080/jetspeed/portal/_ns:..._/foo"onmouseover="alert(1)"
+title="Minimize" class="action portlet-action" ><img
src="/jetspeed/decorations/images/minimized.gif" alt="Minimize" border="0"/></a>
+ ]]></source>
+ </p>
+ </subsection>
</section>
</body>