Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b1bdfd0b-2151-cafd-d5c9-425de23311f4@apache.org>
Date: Tue, 6 Nov 2018 10:05:59 +0100
From: Francesco Chicchiriccò <ilgrosso@...che.org>
To: dev@...cope.apache.org, "user@...cope.apache.org"
 <user@...cope.apache.org>, announce@...che.org,
 Joan Bono <joanet17@...il.com>, oss-security@...ts.openwall.com,
 "security@...che.org" <security@...che.org>, Joan Bono <joanet17@...il.com>
Subject: [SECURITY] CVE-2018-17186 Apache Syncope

CVE-2018-17186: XXE on BPMN definitions

Description:
An administrator with workflow definition entitlements can use DTD to 
perform malicious operations, including but not limited to file read, 
file write, and code execution.

Severity: Medium

Vendor: The Apache Software Foundation

Affects:
Releases prior to 2.1.2
Releases prior to 2.0.11

The unsupported Releases 1.2.x may be also affected.

Solution:
2.0.X users should upgrade to 2.0.11
2.1.X users should upgrade to 2.1.2

Mitigation:
Do not assign workflow definition entitlements to any administrator.

Credit:
This issue was discovered by Kevin Borras Soler and Joan Bono.

References:
https://syncope.apache.org/security






Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.