lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000701d3f28f$d01860a0$704921e0$@gmail.com>
Date: Wed, 23 May 2018 13:16:00 +0100
From: "Simon Steiner" <simonsteiner1984@...il.com>
To: <general@...graphics.apache.org>, <batik-dev@...graphics.apache.org>,
  <batik-users@...graphics.apache.org>, <oss-security@...ts.openwall.com>,
  <bugtraq@...urityfocus.com>, <security-reports@...mle.com>,
  <security@...che.org>
Subject: [CVE-2018-8013] Apache Batik information disclosure vulnerability

CVE-2018-8013:
        Apache Batik information disclosure vulnerability

Severity:
        Medium

Vendor:
        The Apache Software Foundation

Versions Affected:
        Batik 1.0 - 1.9.1
 
Description:
        When deserializing subclass of `AbstractDocument`, the class takes a
string from the inputStream as the class name which then use it to call the
no-arg constructor of the class.
        Fix was to check the class type before calling newInstance in
deserialization.

Mitigation:
        Users should upgrade to Batik 1.10+

Credit:
        This issue was independently reported by Man Yue Mo.

References:
        http://xmlgraphics.apache.org/security.html

The Apache XML Graphics team.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ