geronimo-scm mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
Subject [CONF] Apache Geronimo > Geronimo 2.1.x and 2.2.x Spring Framework SEC02 Patch Instructions
Date Wed, 07 Jul 2010 11:57:01 GMT
    <base href="">
            <link rel="stylesheet" href="/confluence/s/1810/9/1/_/styles/combined.css?spaceKey=GMOxSITE&amp;forWysiwyg=true"
<body style="background: white;" bgcolor="white" class="email-body">
<div id="pageContent">
<div id="notificationFormat">
<div class="wiki-content">
<div class="email">
    <h2><a href="">Geronimo
2.1.x and 2.2.x Spring Framework SEC02 Patch Instructions</a></h2>
    <h4>Page  <b>added</b> by             <a href="">Rick
    <div class="notificationGreySide">
         <h1><a name="Geronimo2.1.xand2.2.xSpringFrameworkSEC02PatchInstructions-Geronimo2.1.xandGeronimo2.2PatchInstructionsforSpringFrameworkSEC02Vulnerability."></a>Geronimo
2.1.x and Geronimo 2.2 Patch Instructions for Spring Framework SEC02 Vulnerability. </h1>
<p>The Spring Framework project has recently discovered a security vulnerability which
may allow a remote attacker to inject malicious code into an application that is using the
Spring Framework.  For more information on this security vulnerability kindly refer the following
	<li><a href="" class="external-link"

<h2><a name="Geronimo2.1.xand2.2.xSpringFrameworkSEC02PatchInstructions-HowisApacheGeronimoAffected%3F"></a>How
is Apache Geronimo Affected?</h2>

<p>Apache Geronimo uses the Spring Framework to implement some functions in the ActiveMQ
console and the vulnerable Spring libraries are included in the Geronimo jar repository. 
It is not believed that the console application is vulnerable to this attack, but any application
that is using the included version of the Spring framework might be.  Users are advised to
update the version of the Spring libraries to remove the chance that this exploit can be used.

<p>These issues have been fixed in Spring Framework version 2.5.6.SEC02.  </p>

<h2><a name="Geronimo2.1.xand2.2.xSpringFrameworkSEC02PatchInstructions-HowcanIavoidthesevulnerabilitiesinApacheGeronimo%3F"></a>How
can I avoid these vulnerabilities in Apache Geronimo?</h2>

<p>It is recommended that you move to Apache Geronimo v2.1.6 or v2.2.1.  These versions
include the updated Spring libraries. </p>

<p>If you wish to remain on an existing version of Geronimo, the installation can be
patched to avoid the vulnerability.  The following steps will upgrade the Spring framework
libraries used by the server. </p>

	<li>If your server is running stop the server.</li>
	<li>Make a backup of the directory &lt;G_HOME&gt;/repository/org/springframework/.
 Once done, delete the directory &lt;G_HOME&gt;/repository/org/springframe/</li>
	<li>Download the 2.5.6.SEC02 version of all jars present in the springframework repository
directory from <a href="" class="external-link"
rel="nofollow"></a>.  For example,
spring-beans-s.5.6.SEC02.jar can be downloaded from <a href=""
class="external-link" rel="nofollow"></a>.
 The following jars are required:
		<li><a href=""
class="external-link" rel="nofollow"></a></li>
		<li><a href=""
class="external-link" rel="nofollow"></a></li>
		<li><a href=""
class="external-link" rel="nofollow"></a></li>
		<li><a href=""
class="external-link" rel="nofollow"></a></li>

	<li>Copy all the jars according to the original repository directory structure. For
example, copy spring-beans-2.5.6.SEC02.jar to &lt;G_HOME&gt;/repository/org/springframework/spring-beans/2.5.6-SEC02</li>
	<li>Open the &lt;G_HOME&gt;/var/config/ in edit
mode and add the following entries:
<div class="preformatted panel" style="border-width: 1px;"><div class="preformattedContent
	<li>Start the server.</li>

    <div id="commentsSection" class="wiki-content pageSection">
       <div style="float: right;">
            <a href=""
class="grey">Change Notification Preferences</a>
       <a href="">View

View raw message