On 01/15/2014 08:13 AM, Richard Seddon wrote:
Just thought I'd let you know that we released a patched version of XStream to 
address the vulnerability our use of XStream deserialization caused in Sonatype 
Nexus.

The code can be found here:

https://github.com/sonatype/xstream-whitelist

This code is designed specifically for use in Nexus, it isn't intended as for 
use in other projects.

A high level overview of it is here (this link is for end users, so is 
simplified a lot):

https://sonatype.zendesk.com/entries/37551958-Configuring-Xstream-Whitelist

If any of the code in the github repo is of use to you please feel free to take 
it.

Regards,

Rich




---------------------------------------------------------------------
To unsubscribe from this list, please visit:

     http://xircles.codehaus.org/manage_email



Thanks for the heads up, Rich. I'm just a bit confused as to whether it is the correct thing moving forward for Nexus to use a different CVE ID than XStream itself. MITRE assigned CVE-2013-7285 to this issue in XStream:

http://www.openwall.com/lists/oss-security/2014/01/10/1

It would make sense for Nexus to have its own CVE ID if the Nexus patch was made to code independent of XStream, but it looks like the patch has been made directly to the XStream library, and as discussed in this thread, is basically an alternative implementation to XStream's own patch for CVE-2013-7285. Based on my understanding of the CVE assignment rules, the Nexus flaw should also be identified by CVE-2013-7285, but I could be wrong. I absolutely understand why Nexus assigned a CVE ID independently for this flaw, but I think it is a duplicate of CVE-2013-7285. I have copied cve@mitre on this message for their input.

Thanks
David

---------------------------------------------------------------------
To unsubscribe from this list, please visit:

   http://xircles.codehaus.org/manage_email


Reply via email to