Thanks a lot for the explanation Andreas! I think we can consider Axis 1.3
safe then.

Regards,
Dariusz

On 21 July 2010 06:37, Andreas Veithen <[email protected]> wrote:

> Dariusz,
>
> The statement in the advisory is based on a test I did on a service
> implemented with Axis 1.4 and on a statement from one of the
> developers of Axis that they identified and fixed this vulnerability
> some years ago. I did not do a code analysis of Axis and I did not do
> a test on any other version of Axis. If you used the exploits
> described in the advisory to test Axis 1.3 and that test gives the
> result you describe, then that version should be considered safe.
>
> Andreas
>
> On Tue, Jul 20, 2010 at 09:33, Dariusz Kordonski
> <[email protected]> wrote:
> > Hi there,
> > tried to deliver the below message to the Axis (original Axis) mailing
> > group, but is seems that the only active group is this one? Hope that
> > somebody here can help me sort out my questions (or direct to the correct
> > mailing group). Thanks!
> > Best regards,
> > Dariusz Kordonski [Atlassian]
> > ---------- Forwarded message ----------
> > From: Dariusz Kordonski <[email protected]>
> > Date: 20 July 2010 16:20
> > Subject: Axis 1.3 and CVE-2010-1632
> > To: [email protected]
> >
> >
> > Hi,
> > we have recently been inquired
> > about
> https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf
> > and if it affects our product (Atlassian JIRA).
> > This security advisory refers to vulnerabilities in Axis2 that result
> from
> > processing (under some conditions) of DTD references by the Axis2 XML
> > parser. The document also clarifies (page 2) that Axis v1.4 is not
> affected
> > by this, as it immediately rejects any requests containing a DOCTYPE
> > declaration.
> > Unfortunately, Atlassian JIRA uses Axis in version *1.3* as a foundation
> for
> > its SOAP API, and, although we are quite certain this version remains
> > unaffected too, we were unable to find any official statement confirming
> our
> > assumptions. We performed some simple tests by means of sending requests
> > with the following declaration:
> > <!DOCTYPE createIssue [
> > <!ENTITY file SYSTEM "/etc/hosts">
> > ]>
> > included at the beginning of the SOAP request. As a result we received:
> > <?xml version="1.0" encoding="utf-8"?>
> > <soapenv:Envelope xmlns:soapenv="
> http://schemas.xmlsoap.org/soap/envelope/";
> > xmlns:xsd="http://www.w3.org/2001/XMLSchema";
> > xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";>
> > <soapenv:Body>
> > <soapenv:Fault>
> > <faultcode>soapenv:Server.userException</faultcode>
> > <faultstring>org.xml.sax.SAXException: Processing instructions are not
> > allowed within SOAP messages</faultstring>
> > <detail>
> > <faultData xsi:type="ns1:SAXException" xmlns:ns1="http://sax.xml.org";>
> > <cause xsi:type="ns2:Throwable" xsi:nil="true"
> > xmlns:ns2="http://lang.java"/>
> > <exception xsi:type="ns3:Exception" xsi:nil="true"
> > xmlns:ns3="http://lang.java"/>
> > <message xsi:type="xsd:string">Processing instructions are not allowed
> > within SOAP messages</message>
> > </faultData>
> > <ns4:hostname
> > xmlns:ns4="http://xml.apache.org/axis/";>notresspassing</ns4:hostname>
> > </detail>
> > </soapenv:Fault>
> > </soapenv:Body>
> > </soapenv:Envelope>
> > which seems to be confirming that Axis v1.3 is indeed protected against
> this
> > particular exploit. We are, however, not quite sure if this kind of test
> is
> > enough. Can you therefore confirm that Axis 1.3 exposes the same level of
> > protection against the above exploit as Axis 1.4 does? Alternatively,
> what
> > other kind of tests should we perform to make sure it does?
> > Best regards,
> > Dariusz Kordonski [Atlassian]
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [email protected]
> For additional commands, e-mail: [email protected]
>
>

Reply via email to