[midPoint] Security Advisory: Workitem identifier weakness
Radovan Semancik
radovan.semancik at evolveum.com
Thu Apr 18 11:16:17 CEST 2019
Date: 18 Apr 2019
Severity: Medium (CVSS 4.3)
Affected versions: all midPoint versions up to 3.9
Fixed in versions: 3.9.1 (unreleased), 3.8.1 (unreleased), 3.7.2
(unreleased), 3.6.2 (unreleased)
Description
Any approver can display any workitem by guessing its short identifier.
Severity and Impact
This is medium-severity issue. The attacker can get read access to
information stored in workitems that should otherwise be inaccessible.
Impact of this vulnerability is limited to information leakage
(confidentiality). Attacker cannot act on those workitems (integrity is
not impacted). Approver role is needed to exploit this vulnerability.
Mitigation
MidPoint users are advised to upgrade their deployments to the latest
builds from the support branches.
As this is a medium severity issue, it is not forcing official
maintenance releases of midPoint. However, the fix is provided in all
the support branches.
Discussion and Explanation
MidPoint 3.9 and earlier relied on Actitivi for all workflow-related
processing. Activiti is a general-purpose workflow engine and the design
of Activiti is based on a different paradigms that the design of
midPoint. Therefore during the course of midPoint development there were
often integration difficulties and compromise solutions have to be
implemented. This vulnerability may be considered an indirect
consequence of such a compromise. Temporary solution that significantly
reduces the probability of identifier guessing was implemented for
midPoint 3.9 and earlier.
The "conceptual incompatibility" of Activiti and midPoint core was also
one of the reason for a decision to remove Activiti component in
midPoint 4.0 and later. MidPoint 4.0 is using a completely different
mechanism for dealing with workitems which is conceptually compatible
with the rest of midPoint and especially with midPoint authorization
mechanism.
Credit
Variants of this issue were reported by Martin Liznerby the means of
EU-Free and Open Source Software Auditing (EU-FOSSA2) project.
See Also
https://wiki.evolveum.com/display/midPoint/Security+Advisory%3A+Workitem+identifier+weakness
--
Radovan Semancik
Software Architect
evolveum.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.evolveum.com/pipermail/midpoint/attachments/20190418/b791cc69/attachment.htm>
More information about the midPoint
mailing list