lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <000701d3f28f$d01860a0$704921e0$@gmail.com> Date: Wed, 23 May 2018 13:16:00 +0100 From: "Simon Steiner" <simonsteiner1984@...il.com> To: <general@...graphics.apache.org>, <batik-dev@...graphics.apache.org>, <batik-users@...graphics.apache.org>, <oss-security@...ts.openwall.com>, <bugtraq@...urityfocus.com>, <security-reports@...mle.com>, <security@...che.org> Subject: [CVE-2018-8013] Apache Batik information disclosure vulnerability CVE-2018-8013: Apache Batik information disclosure vulnerability Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Batik 1.0 - 1.9.1 Description: When deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization. Mitigation: Users should upgrade to Batik 1.10+ Credit: This issue was independently reported by Man Yue Mo. References: http://xmlgraphics.apache.org/security.html The Apache XML Graphics team.
Powered by blists - more mailing lists