[midPoint] Security Advisory: XXE Vulnerabilities
Radovan Semancik
radovan.semancik at evolveum.com
Wed Apr 17 14:00:18 CEST 2019
Date: 17 Apr 2019
Severity: Medium (CVSS 6.8)
Affected versions: all midPoint versions
Fixed in versions: 4.0 (unreleased), 3.9.1 (unreleased), 3.8.1
(unreleased), 3.7.2 (unreleased), 3.6.2 (unreleased)
Description
The way how MidPoint handles XML documents is vulnerable to attacks
based on XML External Entities (XXE). MidPoint is parsing XML documents
that can contain embedded DTD and Entity declarations. Those can be
abused to gain information that otherwise should be accessible.
Severity and Impact
This is medium-severity issue. The attacker can read files that are
accessible to the process that midPoint is running in. However, it is
unlikely that this vulnerability could expose any information that
cannot be exposed by other means already (see below).
Mitigation
MidPoint users are advised to upgrade their deployments to the latest
builds from the support branches.
As this is a medium severity issue, it is not forcing official
maintenance releases of midPoint. However, the fix is provided in all
the support branches.
Discussion and Explanation
The attacker needs an ability to add or modify XML files in the system,
e.g. the ability to edit objects in raw XML form, create queries in XML
form and so on. Therefore this vulnerability is usually exposed only to
system administrators that already have high privileges. In that case it
is unlikely that this vulnerability would expose any information that
cannot be exposed by other mechanisms already. E.g. system
administrators can use script expression to get the same information as
is exposed by the XXE vulnerabilities.
However, there is a planned solution to limit data exposure by
expressions. If that mechanism is implemented, XXE vulnerability may
become a significant problem. Therefore the use of XXE in XML was
explicitly disabled. This is reducing potential data exposure in future
midPoint versions.
Credit
Variants of this issue were reported by testers known as A855 and XiaoX
by the means of EU-Free and Open Source Software Auditing (EU-FOSSA2)
project.
See Also
https://wiki.evolveum.com/display/midPoint/Security+Advisory%3A+XXE+Vulnerabilities
--
Radovan Semancik
Software Architect
evolveum.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.evolveum.com/pipermail/midpoint/attachments/20190417/4376a966/attachment.htm>
More information about the midPoint
mailing list