Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HIGH-LEVEL VULNERABILITY WITHIN MOJARRA JSF V2.2 #4556

Closed
ruolli opened this issue Apr 3, 2019 · 1 comment
Closed

HIGH-LEVEL VULNERABILITY WITHIN MOJARRA JSF V2.2 #4556

ruolli opened this issue Apr 3, 2019 · 1 comment
Assignees

Comments

@ruolli
Copy link
Contributor

ruolli commented Apr 3, 2019

This is a security bug. Please fix it in accordance with:
Http://security.us.oracle.com/doku.php?id=gps:resource:process:bugfix

Dear Oracle team,

SEC Consult is a leading consulting company for information security. During
a short security crash test we have found a high-level security vulnerability
within Oracle Mojarra JSF v2.2.

The encrypted security advisory with proof of concept information is
attached. I have also attached my public PGP and S/MIME keys for further
encrypted communication. Please provide us with an estimate on when the
vulnerability will be fixed in order to set the actual release date. Please
keep us informed if there are any changes.

Please also see our attached responsible disclosure policy (PDF) which
defines the process of publication of the security advisory. The security
advisory will be released according to the chapter 5.3, phase 3 "Public
disclosure", the latest possible release date is 50 days from now: 2019-01-11

Keep in mind that we can't give any other free support besides providing the
security advisory information.

Best regards,

Jean-Benjamin Rousseau
Security Consultant

@ruolli
Copy link
Contributor Author

ruolli commented Apr 3, 2019

To reproduce the issue, please follow the steps in advisory.txt
advisory.txt

And, please use below *.war application, instead of the HelloPrimeFaces mentioned in advisory.txt .
primefacesexample-1.0-SNAPSHOT.war.zip

Please rename *.war.zip to *.war before deploying it.
It is just renamed, not zipped before uploading, so, it's not necessary to unzip it.

@ruolli ruolli changed the title HIGH-LEVEL VULNERABILITY WITHIN ORACLE MOJARRA JSF V2.2 HIGH-LEVEL VULNERABILITY WITHIN MOJARRA JSF V2.2 Apr 3, 2019
ruolli added a commit that referenced this issue May 16, 2019
Fixes #4556 : HIGH-LEVEL VULNERABILITY WITHIN MOJARRA JSF V2.2
@arjantijms arjantijms self-assigned this Jul 28, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants