blob: 795f4b5a98547a9d1ff97554f283841bff8dc65d [file] [log] [blame]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
CVE-2018-8039: Apache CXF TLS hostname verification does not work correctly
with com.sun.net.ssl.*
Severity: Major
Vendor: The Apache Software Foundation
Versions Affected:
This vulnerability affects all versions of Apache CXF prior to 3.2.5 and
3.1.16.
Description:
It is possible to configure CXF to use the com.sun.net.ssl implementation via:
System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");
When this system property is set, CXF uses some reflection to try to make the
HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface.
However, the default HostnameVerifier implementation in CXF does not implement
the method in this interface, and an exception is thrown. However, the
exception is caught in the reflection code and not properly propagated.
What this means is that if you are using the com.sun.net.ssl stack with CXF,
an error with TLS hostname verification will not be thrown, leaving a CXF
client subject to man-in-the-middle attacks.
This has been fixed in revision:
https://github.com/apache/cxf/commit/fae6fabf9bd7647f5e9cb68897a7d72b545b741b
Migration:
Apache CXF users who are using the com.sun.net.ssl implementation should
upgrade to 3.2.5 or 3.1.16 as soon as possible.
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEE20Xs0ZuXUU9ycQWuZ7+AsQrVOYMFAlsxFawACgkQZ7+AsQrV
OYNTnQf+NPXufPNqf24h8qfexe7qo5p5yIWMqKzpaQqzjPUSMw9Bq4UhySIqbUTo
cNo2p9aSsCHYz/AYKxN2k08nqNmG/e8cHtlMGwQylbqY3WEhjQAcvkIDKtwjBIVE
4MqE6RH0wOaFab1NnbF6TWR3bmCRsr9iMuFi3RrQv7pWAS6YAoJGFEua8IVjuPrd
KypJunpOc606eRmeaD1a6sLybqkxvQhhN+xGq20MwbPSv2CVRaTGrBa1nN7kdhNW
JHVPxyvewRGuPYd5g5BfoHzvdMuIqSXK3t43PVLKTApouCXfrWkIoPIMJge30arZ
PXEwwN8LRvJfcG0CPNUb7/AAfk0VLQ==
=xqB7
-----END PGP SIGNATURE-----