Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAB8XdGDCati--2zruoauZNU0Lta66Y3VmYX6EzGyznvRu0irhg@mail.gmail.com>
Date: Wed, 1 Apr 2020 10:57:20 +0100
From: Colm O hEigeartaigh <coheigea@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2020-1954: Apache CXF JMX Integration is vulnerable to a MITM attack

CVE-2020-1954: Apache CXF JMX Integration is vulnerable to a MITM attack

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected:

This vulnerability affects all versions of Apache CXF prior to 3.3.6 and
3.2.13.

Description:

Apache CXF has the ability to integrate with JMX by registering an
InstrumentationManager extension with the CXF bus. If the
"createMBServerConnectorFactory" property of the default
InstrumentationManagerImpl is not disabled, then it is vulnerable to a
man-in-the-middle (MITM) style attack.

An attacker on the same host can connect to the registry and rebind the
entry
to another server, thus acting as a proxy to the original. They are then
able
to gain access to all of the information that is sent and received over JMX.

Mitigation:

Users of Apache CXF that use the InstrumentationManagerImpl should update to
either 3.3.6 or 3.2.13. Alternatively, set the
createMBServerConnectorFactory
property to false and use the default JVM JMX remote capabilities instead.
From
CXF 3.4.0, the createMBServerConnectorFactory property will be removed
altogether.

Credit:

Jonathan Gallimore, Tomitribe and Colm O hEigeartaigh, Talend.

Reference:
http://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.