|
Message-ID: <017201d2b81c$4defec50$e9cfc4f0$@gmail.com> Date: Tue, 18 Apr 2017 09:18:04 +0100 From: "Simon Steiner" <simonsteiner1984@...il.com> To: <general@...graphics.apache.org>, <fop-users@...graphics.apache.org>, <fop-dev@...graphics.apache.org>, <oss-security@...ts.openwall.com>, <bugtraq@...urityfocus.com> Cc: "'Pierre Ernst'" <pernst@...esforce.com> Subject: [CVE-2017-5661] Apache XML Graphics FOP information disclosure vulnerability CVE-2017-5661: Apache XML Graphics FOP information disclosure vulnerability Severity: Medium Vendor: The Apache Software Foundation Versions Affected: FOP 1.0 - 2.1 Description: Files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server--including confidential or sensitive files--would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack. Mitigation: Users should upgrade to FOP 2.2+ Credit: This issue was independently reported by Pierre Ernst at Salesforce. References: http://xmlgraphics.apache.org/security.html The Apache XML Graphics team.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.