Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-8039

Опубликовано: 29 июн. 2018
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks.

It was discovered that when Apache CXF is configured to use the system property com.sun.net.ssl.internal.www.protocol ,it uses reflection to make the HostnameVerifier work with old com.sun.net.ssl.HostnameVerifier interface. Although the CXF implementation throws an exception, which is caught in the reflection code but it is not properly propagated, this can lead to a man-in-the-middle attack.

Отчет

In OpenShift Logging the openshift-logging/elasticsearch6-rhel8 container bundles the vulnerable version of apache-cxf, but the vulnerable class is not shipped, hence this component is not affected by this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Not affected
Red Hat BPM Suite 6cxf-coreNot affected
Red Hat JBoss BRMS 6cxfNot affected
Red Hat JBoss Data Virtualization 6cxf-coreNot affected
Red Hat JBoss Enterprise Application Platform 6cxf-coreNot affected
Red Hat JBoss Fuse 6cxf-coreAffected
Red Hat OpenShift Application Runtimescxf-coreAffected
Red Hat Single Sign-On 7cxf-coreNot affected
Red Hat Fuse 7.2cxf-coreFixedRHSA-2018:376804.12.2018
Red Hat JBoss A-MQ 6.3FixedRHSA-2018:381711.12.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-248
https://bugzilla.redhat.com/show_bug.cgi?id=1595332apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.*

EPSS

Процентиль: 86%
0.02899
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 7 лет назад

It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks.

CVSS3: 8.1
github
больше 7 лет назад

Apache CXF TLS hostname verification does not work correctly with com.sun.net.ssl.*

CVSS3: 8.1
fstec
почти 7 лет назад

Уязвимость компонента com.sun.net.ssl каркаса для веб-сервисов Apache CXF, позволяющая нарушителю реализовать атаку типа «человек посередине»

EPSS

Процентиль: 86%
0.02899
Низкий

6.5 Medium

CVSS3