Skip to content
Permalink
Browse files
site update
  • Loading branch information
spyhunter99 committed Jul 28, 2021
1 parent 5988d07 commit 4bfb64babdf5781e0e69cde9a98525f5eed3d380
Showing 3 changed files with 30 additions and 1 deletion.
@@ -43,6 +43,8 @@ jUDDI (pronounced "Judy") is an open source Java implementation of [OASIS](https

## News

Jul 1, 2021, jUDDI Release 3.3.10

Aug 18, 2020, jUDDI Release 3.3.9

Mar 15, 2020, jUDDI Release 3.3.8
@@ -4,7 +4,7 @@ Title: Downloads and Releases

| Name | Date | Description |
| --- | --- | --- |
| [3.3.9](http://www.apache.org/dyn/closer.cgi/juddi/juddi/3.3.9/) | Aug 18, 2020 | Stable 3.3.9 Release | |
| [3.3.10](http://www.apache.org/dyn/closer.cgi/juddi/juddi/3.3.10/) | Jul 1, 2021 | Stable 3.3.10 Release | |
| [Older releases](http://archive.apache.org/dist/juddi/) | | Archived Releases |


@@ -2,6 +2,33 @@ Title: Security Advisories

## Security Advisories for Apache jUDDI

### CVEID [CVE-2021-37578](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37578)

VERSION: older than 3.3.10

PROBLEMTYPE: Remote Code Execution

REFERENCES: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37578

DESCRIPTION: Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services.

RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely.

For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.

Severity: Low

Mitigation:

jUDDI Clients, disable RMITransports (found in uddi.xml) and use alternate transports such as HTTPS.
jUDDI Server (juddiv3.war/WEB-INF/classes/juddiv3.xml), disable JNDI and RMI settings in juddiv3.xml.
The appropriate settings are located below in xpath style notation.

juddi/jndi/registration=false
juddi/rmi/registration=false

If the settings are not present, then JNDI and RMI are already disabled. This is the default setting.

### CVEID [CVE-2018-1307](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1307)

VERSION: 3.2 through 3.3.4

0 comments on commit 4bfb64b

Please sign in to comment.