Hi there,

tried to deliver the below message to the Axis (original Axis) mailing
group, but is seems that the only active group is this one? Hope that
somebody here can help me sort out my questions (or direct to the correct
mailing group). Thanks!

Best regards,
Dariusz Kordonski [Atlassian]

---------- Forwarded message ----------
From: Dariusz Kordonski <[email protected]>
Date: 20 July 2010 16:20
Subject: Axis 1.3 and CVE-2010-1632
To: [email protected]


Hi,

we have recently been inquired about
https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdfand
if it affects our product (Atlassian JIRA).

This security advisory refers to vulnerabilities in Axis2 that result from
processing (under some conditions) of DTD references by the Axis2 XML
parser. The document also clarifies (page 2) that Axis v1.4 is not affected
by this, as it immediately rejects any requests containing a DOCTYPE
declaration.

Unfortunately, Atlassian JIRA uses Axis in version *1.3* as a foundation for
its SOAP API, and, although we are quite certain this version remains
unaffected too, we were unable to find any official statement confirming our
assumptions. We performed some simple tests by means of sending requests
with the following declaration:
<!DOCTYPE createIssue [
<!ENTITY file SYSTEM "/etc/hosts">
]>

included at the beginning of the SOAP request. As a result we received:

<?xml version="1.0" encoding="utf-8"?>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/";
xmlns:xsd="http://www.w3.org/2001/XMLSchema"; xmlns:xsi="
http://www.w3.org/2001/XMLSchema-instance";>
<soapenv:Body>
<soapenv:Fault>
<faultcode>soapenv:Server.userException</faultcode>
<faultstring>org.xml.sax.SAXException: Processing instructions are not
allowed within SOAP messages</faultstring>
<detail>
<faultData xsi:type="ns1:SAXException" xmlns:ns1="http://sax.xml.org";>
<cause xsi:type="ns2:Throwable" xsi:nil="true" xmlns:ns2="http://lang.java
"/>
<exception xsi:type="ns3:Exception" xsi:nil="true" xmlns:ns3="
http://lang.java"/>
<message xsi:type="xsd:string">Processing instructions are not allowed
within SOAP messages</message>
</faultData>
<ns4:hostname xmlns:ns4="http://xml.apache.org/axis/
">notresspassing</ns4:hostname>
</detail>
</soapenv:Fault>
</soapenv:Body>
</soapenv:Envelope>

which seems to be confirming that Axis v1.3 is indeed protected against this
particular exploit. We are, however, not quite sure if this kind of test is
enough. Can you therefore confirm that Axis 1.3 exposes the same level of
protection against the above exploit as Axis 1.4 does? Alternatively, what
other kind of tests should we perform to make sure it does?

Best regards,
Dariusz Kordonski [Atlassian]

Reply via email to