brooklyn-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Richard Downer <rich...@apache.org>
Subject [SECURITY] CVE-2017-3165: Cross-site vulnerabilities in Apache Brooklyn
Date Fri, 10 Feb 2017 16:21:18 GMT
CVE-2017-3165: Cross-site vulnerabilities in Apache Brooklyn

Severity: Major

Vendor:
The Apache Software Foundation

Versions Affected:
Apache Brooklyn 0.9.0 and all prior versions

Description:
Apache Brooklyn's REST server is vulnerable to cross-site scripting where
one authenticated user can cause scripts to run in the browser of another
user authorized to access the first user's resources.  This is due to
improper escaping of server-side content.  There is known to be a
proof-of-concept exploit using this vulnerability.

Solution:
Upgrade to Apache Brooklyn 0.10.0. This includes commit [1] correctly
escaping text and other content provided by a user to prevent untrusted
javascript from executing in the browser.

Temporary mitigation if you cannot upgrade to 0.10.0:
Do not share a Brooklyn server with untrusted users without an enhanced
entitlements scheme.

Example exploit:
Attacking user deploys an entity with a name "<script>alert(0);</script>".
Any user browsing that entity will have the "alert(0);" script executed.

Credit:
This vulnerability was discovered by Toshitsugu Yoneyama of Mitsui Bussan
Secure Directions, Inc., and reported to JPCERT/CC who reported them to the
Apache Software Foundation on his behalf.

Other references:
JPCERT/CC JVN#55489964

Mime
  • Unnamed multipart/alternative (inline, None, 0 bytes)
View raw message