[prev in list] [next in list] [prev in thread] [next in thread] 

List:       sandesha-dev
Subject:    [jira] [Comment Edited] (AXIS2-6060) [Axis2]Security Vulnerability - Action Required: XXE vulnerabil
From:       "Andreas Veithen (Jira)" <jira () apache ! org>
Date:       2023-10-29 11:40:00
Message-ID: JIRA.13547725.1692275706000.187283.1698579600028 () Atlassian ! JIRA
[Download RAW message or body]


    [ https://issues.apache.org/jira/browse/AXIS2-6060?page=com.atlassian.jira.plugin. \
system.issuetabpanels:comment-tabpanel&focusedCommentId=17756580#comment-17756580 ] 

Andreas Veithen edited comment on AXIS2-6060 at 10/29/23 11:39 AM:
-------------------------------------------------------------------

Note that the schema files are loaded from the classpath. If an attacker can \
manipulate the classpath, then they would be able to execute arbitrary code anyway. I \
don't see how an attacker would achieve any kind of privilege escalation.


was (Author: veithen):
Note that the schema files are loaded from the classpath. If an attacker can \
manipulate the classpath, then they would be able to execute arbitrary code anyway. I \
don't see how there an attacker would achieve any kind of privilege escalation.

> [Axis2]Security Vulnerability - Action Required: XXE vulnerability in the newest \
>                 version of org.apache.axis2:axis2
> ------------------------------------------------------------------------------------------------------------------
>  
> Key: AXIS2-6060
> URL: https://issues.apache.org/jira/browse/AXIS2-6060
> Project: Axis2
> Issue Type: Bug
> Components: codegen, wsdl
> Affects Versions: 1.8.0
> Reporter: Yiheng Cao
> Priority: Major
> 
> The vulnerability is present in the class  \
> org.apache.axis2.wsdl.codegen.extension.JAXBRIExtension      of method  \
> getNamespaceAwareDocumentBuilder()    , which is responsible for getting a \
> DocumentBuilder object that supports namespace resolution. The vulnerable call \
> chain we discover is:  *engage(CodeGenConfiguration \
> configuration)→loadAdditionalSchemas()→getNamespaceAwareDocumentBuilder().* \
> Given that the  XML schema files stored in the \
> /org/apache/axis2/wsdl/codegen/schema/  which is compromised by a hacker, the \
> victim conducts regular process which incorporates the execution of method \
> engage(),  resulting in an XML External Entity (XXE) Injection attack.    



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: java-dev-unsubscribe@axis.apache.org
For additional commands, e-mail: java-dev-help@axis.apache.org


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic