[ 
https://issues.apache.org/jira/browse/GERONIMO-4597?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Rex Wang closed GERONIMO-4597.
------------------------------


closing it

> Validate Web Admin Console input - address admin console security 
> vulnerabilities
> ---------------------------------------------------------------------------------
>
>                 Key: GERONIMO-4597
>                 URL: https://issues.apache.org/jira/browse/GERONIMO-4597
>             Project: Geronimo
>          Issue Type: Bug
>      Security Level: public(Regular issues) 
>          Components: console
>    Affects Versions: 2.1, 2.1.1, 2.1.2, 2.1.3
>            Reporter: Joe Bohn
>            Assignee: Joe Bohn
>             Fix For: 2.1.4, 2.1.5, 2.2
>
>         Attachments: G4597_branch_20.patch
>
>
> This JIRA addresses the following security vulnerabilities in the web admin 
> console:
> CVE-2008-5518: Apache Geronimo web administration console directory traversal 
> vulnerabilities.
> A vulnerability was found in several portlets including Services/Repository, 
> Embedded DB/DB Manager, and Security/Keystores when running the Apache 
> Geronimo server on Windows. This issue may allow a remote attacker to upload 
> any file in any directory.  This affects all full JavaEE Geronimo assemblies 
> or other distributions which include the administration web console up to and 
> including Apache Geronimo 2.1.3. An alternative workaround (if you choose to 
> not upgrade to Apache Geronimo 2.1.4) would be to stop or undeploy the 
> administration web console application in the server.
> Credit: The Apache Geronimo project would like to thank Digital Security 
> Research Group (dsecrg.com) for responsibly reporting this issue and 
> assisting us with validating  our fixes.
> CVE-2009-0038: Apache Geronimo web administration console XSS vulnerabilities
> Various linked and stored cross-site scripting (XSS) vulnerabilities were 
> found in the Apache Geronimo administrative console and related utilities.  
> Using this vulnerability an attacker can steal an administrator's cookie and 
> then authenticate as administrator or perform certain administrative actions. 
> For example, a user can inject XSS in some URLs or in several input fields in 
> various portlets.  This affects all full JavaEE Geronimo assemblies or other 
> distributions which include the administration web console up to and 
> including Apache Geronimo 2.1.3.  An alternative workaround (if you choose to 
> not upgrade to Apache Geronimo 2.1.4) would be to stop or undeploy the 
> administration web console application in the server.
> Credit: The Apache Geronimo project would like to thank Digital Security 
> Research Group (dsecrg.com) and Marc Schoenefeld (Red Hat Security Response 
> Team) for responsibly reporting this issue and assisting us with validating 
> our fixes.
> CVE-2009-0039: Apache Geronimo web administration console XSRF vulnerabilities
> Various cross-site request forgery (XSRF or CSRF) vulnerabilities were 
> identified in the Apache Geronimo web administration console. Exploiting 
> these issues may allow a remote attacker to perform certain administrative 
> actions, e.g. change web administration password, upload applications, etc... 
> using predictable URL requests once the user has authenticated and obtained a 
> valid session with the server.  This affects all full JavaEE Geronimo 
> assemblies or other distributions which include the administration web 
> console up to and including Apache Geronimo 2.1.3.  An alternative workaround 
> (if you choose to not upgrade to Apache Geronimo 2.1.4) would be to stop or 
> undeploy the administration web console application in the server.
> Credit: The Apache Geronimo project would like to thank Digital Security 
> Research Group (dsecrg.com) for responsibly reporting this issue and 
> assisting us with validating our fixes. 
> It corrects the issues with the addition of directory checks and a servlet 
> filter to check for XSS and XSRF vulnerabilities

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to