Java XSLT security advisory addendum

2009.06.03
Risk: High
Local: No
Remote: Yes
CWE: CWE-264


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================ Illegalaccess.org security advisory addendum ============================================ Vendor informed: April, 2004 Public Advisory released: August 2, 2004 Today: August 9, 2004 URL: http://www.illegalaccess.org Original advisory: http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57613 Threat: In all versions of JDK 1.4.x a vulnerability exists that allows to juggle XSLT processing classes inside the JVM that enable entities to sniff XML data that is processed with the XSLT processor anywhere is the same JVM. We called this technique "XML sniffing" and is based on covert channels. The paper "Antipatterns in JDK security and refactorings" presented at DIMVA 2004 (Dortmund, Germany, 7th of July 2004) shows the general principle of covert channels between distinct java protection domains. Scope: In addition to the Sun Advisory all boundaries between java protection domains can be traversed by XML sniffing. The threat is NOT LIMITED TO APPLETS, so in a web server environment an unprivileged servlet may inject hook code in the XSLT processor management data structures that sniffs the XML data which is processed by the XSLT processor throughout the whole tomcat or j2ee server and finally passes it back to the injector class. As well may an unprivileged application started by Java Webstart sniff XML data loaded from a signed application, when executing XSLT operations. This should be taken into account when processing confident data with JDK 1.4 based software. Short: Any unprivileged class in the JVM may sniff all XML passing through the XSLT processor. Details & Exploit: A detailed description of the framework that allows detection of those covert channels and PoC code that demonstrates the flaw in detail will be included in an upcoming paper, and in my upcoming PhD thesis at Bamberg university. So be sure to preorder a signed copy of the thesis:-) Sincerely Marc Schoenefeld - -- Never be afraid to try something new. Remember, amateurs built the ark; professionals built the Titanic. -- Anonymous Marc Schnefeld Dipl. Wirtsch.-Inf. / Software Developer -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (AIX) iD8DBQFBFrN9qCaQvrKNUNQRAn+VAJwI72zwrvZEiDGrjxrKKAHFC9KMrACbB8ch mofWFyw0U4ImrPgZb4kk3bY= =0ZEy -----END PGP SIGNATURE-----

References:

http://xforce.iss.net/xforce/xfdb/16864
http://www.securityfocus.com/bid/10844
http://www.securityfocus.com/archive/1/371208
http://www.osvdb.org/8288
http://securitytracker.com/id?1011661
http://secunia.com/advisories/12206
http://groups.google.com/group/comp.security.unix/tree/browse_frm/month/2004-10/fe63f1daa9689d50?rnum=161&_done=%2Fgroup%2Fcomp.security.unix%2Fbrowse_frm%2Fmonth%2F2004-10%3Ffwc%3D1%26#doc_29036353582c690d
http://groups.google.com/group/comp.security.unix/tree/browse_frm/month/2004-10/fe63f1daa9689d50?rnum=161&_done=%2Fgroup%2Fcomp.security.unix%2Fbrowse_frm%2Fmonth%2F2004-10%3Ffwc%3D1%26#doc_29036353582c690d
http://archive.cert.uni-stuttgart.de/uniras/2004/08/msg00007.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top