Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID:
 <MWHPR02MB22389492555FC92CF8BE4E5CB40A0@MWHPR02MB2238.namprd02.prod.outlook.com>
Date: Tue, 28 Jan 2020 14:26:26 +0000
From: Angela Schreiber <anchela@...be.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
CC: "'private@...krabbit.apache.org'" <private@...krabbit.apache.org>,
	"security@...che.org" <security@...che.org>
Subject: CVE-2020-1940: Apache Jackrabbit Oak sensitive information disclosure
 vulnerability

CVE-2020-1940:
Apache Jackrabbit Oak sensitive information disclosure vulnerability

Vendor:
The Apache Software Foundation

Versions Affected:
Apache Jackrabbit Oak (org.apache.jackrabbit.oak-core) 1.2.0 to 1.22.0

Description:
The optional initial password change and password expiration features [1] are prone to a
sensitive information disclosure vulnerability. The code mandates the changed password to
be passed as an additional attribute to the credentials object but does not remove it upon
processing during the first phase of the authentication. In combination with additional,
independent authentication mechanisms, this may lead to the new password being disclosed.

Mitigation:
1.12.0 - 1.22.0 should be upgraded to 1.24.0
1.10.x should be upgraded to 1.10.8
For older maintained and affected branches (1.2.x, 1.4.x, 1.6.x, 1.8.x) please find patches attached.

Credits:
The issue was reported by Andrew Khoury and Russ Wright of Adobe.

References:
[1] http://jackrabbit.apache.org/oak/docs/security/user/expiry.html


Content of type "text/html" skipped

Download attachment "UserAuthentication_1_2.patch" of type "application/octet-stream" (6368 bytes)

Download attachment "UserAuthentication_1_4.patch" of type "application/octet-stream" (8297 bytes)

Download attachment "UserAuthentication_1_6.patch" of type "application/octet-stream" (8297 bytes)

Download attachment "UserAuthentication_1-8.patch" of type "application/octet-stream" (8628 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.