Author: tn Date: Sat Nov 21 09:51:39 2015 New Revision: 1715489 URL: http://svn.apache.org/viewvc?rev=1715489&view=rev Log: Add security report.
Added: commons/proper/collections/trunk/src/site/xdoc/security-reports.xml (with props) Modified: commons/proper/collections/trunk/src/site/site.xml Modified: commons/proper/collections/trunk/src/site/site.xml URL: http://svn.apache.org/viewvc/commons/proper/collections/trunk/src/site/site.xml?rev=1715489&r1=1715488&r2=1715489&view=diff ============================================================================== --- commons/proper/collections/trunk/src/site/site.xml (original) +++ commons/proper/collections/trunk/src/site/site.xml Sat Nov 21 09:51:39 2015 @@ -24,15 +24,16 @@ <body> <menu name="Collections"> - <item name="Overview" href="/index.html"/> - <item name="Download" href="/download_collections.cgi"/> - <item name="Users guide" href="/userguide.html"/> - <item name="History" href="/history.html"/> - <item name="Release Notes v4.0" href="/release_4_0.html"/> + <item name="Overview" href="/index.html"/> + <item name="Download" href="/download_collections.cgi"/> + <item name="Security Reports" href="/security-reports.html"/> + <item name="Users guide" href="/userguide.html"/> + <item name="History" href="/history.html"/> + <item name="Release Notes v4.0" href="/release_4_0.html"/> <item name="Release Notes v3.2.2" href="/release_3_2_2.html"/> - <item name="Javadoc v4.1" href="/javadocs/api-release/index.html"/> - <item name="Javadoc v4.0" href="/javadocs/api-4.0/index.html"/> - <item name="Javadoc v3.2.2" href="/javadocs/api-3.2.2/index.html"/> + <item name="Javadoc v4.1" href="/javadocs/api-release/index.html"/> + <item name="Javadoc v4.0" href="/javadocs/api-4.0/index.html"/> + <item name="Javadoc v3.2.2" href="/javadocs/api-3.2.2/index.html"/> </menu> <menu name="Development"> Added: commons/proper/collections/trunk/src/site/xdoc/security-reports.xml URL: http://svn.apache.org/viewvc/commons/proper/collections/trunk/src/site/xdoc/security-reports.xml?rev=1715489&view=auto ============================================================================== --- commons/proper/collections/trunk/src/site/xdoc/security-reports.xml (added) +++ commons/proper/collections/trunk/src/site/xdoc/security-reports.xml Sat Nov 21 09:51:39 2015 @@ -0,0 +1,111 @@ +<?xml version="1.0"?> +<!-- + Licensed to the Apache Software Foundation (ASF) under one or more + contributor license agreements. See the NOTICE file distributed with + this work for additional information regarding copyright ownership. + The ASF licenses this file to You under the Apache License, Version 2.0 + (the "License"); you may not use this file except in compliance with + the License. You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. +--> +<document> + <properties> + <title>Commons Collections Security Reports</title> + <author email="d...@commons.apache.org">Commons Documentation Team</author> + </properties> + <body> + <section name="General Information"> + <p>For information about reporting or asking questions about + security problems, please see the <a + href="http://commons.apache.org/security.html">security page + of the Commons project</a>.</p> + </section> + + <section name="Apache Commons Collections Security Vulnerabilities"> + <p>This page lists all security vulnerabilities fixed in + released versions of Apache Commons Collections. Each + vulnerability is given a security impact rating by the + development team - please note that this rating may vary from + platform to platform. We also list the versions of Commons + Collections the flaw is known to affect, and where a flaw has not + been verified list the version with a question mark.</p> + + <p>Please note that binary patches are never provided. If you + need to apply a source code patch, use the building + instructions for the Commons Collections version that you are + using.</p> + + <p>If you need help on building Commons Collections or other help + on following the instructions to mitigate the known + vulnerabilities listed here, please send your questions to the + public <a href="mail-lists.html">Collections Users mailing + list</a>.</p> + + <p>If you have encountered an unlisted security vulnerability + or other unexpected behaviour that has security impact, or if + the descriptions here are incomplete, please report them + privately to the Apache Security Team. Thank you.</p> + + <subsection name="Fixed in Apache Commons Collections 3.2.2/4.1"> + <p><b>High: Remote Code Execution during object de-serialization</b></p> + + <p>The Apache Commons Collections library contains various classes + in the "functor" package which are serializable and use reflection. + This can be exploited for remote code execution attacks by injecting + specially crafted objects to applications that de-serialize + java objects from untrusted sources and have the Apache Commons Collections + library in their classpath and do not perform any kind of input + validation.</p> + + <p>The implemented fix can be tracked via its related issue + <a href="https://issues.apache.org/jira/browse/COLLECTIONS-580">COLLECTIONS-580</a>:</p> + + <ul> + <li><b>3.2.2</b>: de-serialization of unsafe classes in the functor package + will trigger an "UnsupportedOperationException" by default. In order to re-enable + the previous behavior, the system property + "org.apache.commons.collections.enableUnsafeSerialization" has to be set to "true".</li> + <li><b>4.1</b>: de-serialization support for unsafe classes in the functor package + has been completely removed (unsafe classes do not implement Serializable anymore).</li> + </ul> + + <p>The potential exploit was first presented at AppSecCali2015 [3] on 28 January 2015 by + Gabriel Lawrence and Chris Frohoff. Based on these exploits, Stephen Breen published + on 06 November 2015 attack scenarios [4] for various products like WebSphere, JBoss, Jenkins, + WebLogic, and OpenNMS. The Security team was <b>not</b> informed about these security + problems prior to their publication. No CVE id was assigned for the Apache Commons + Collections library, please refer to [1] or [2] for more information about the general + problem with Java serialization.</p> + + <p>Affects: 3.0 - 4.0</p> + + <p>Related links:</p> + + <ol> + <li>Vulnerability Report for Oracle Weblogic Server: + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4852">CVE-2015-4852</a></li> + <li>Apache Commons + <a href="https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread">statement</a> + to widespread Java object de-serialisation vulnerability</li> + <li><a href="http://www.slideshare.net/frohoff1/appseccali-2015-marshalling-pickles"> + Presentation</a> @ AppSecCali2015 by Lawrence and Frohoff</li> + <li><a href="http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability">Attack scenarios</a> + for various products by Stephen Breen</li> + </ol> + + </subsection> + </section> + + <section name="Errors and Ommissions"> + <p>Please report any errors or omissions to <a + href="mail-lists.html">the dev mailing list</a>.</p> + </section> + </body> +</document> Propchange: commons/proper/collections/trunk/src/site/xdoc/security-reports.xml ------------------------------------------------------------------------------ svn:eol-style = native Propchange: commons/proper/collections/trunk/src/site/xdoc/security-reports.xml ------------------------------------------------------------------------------ svn:keywords = Id Revision HeadURL Propchange: commons/proper/collections/trunk/src/site/xdoc/security-reports.xml ------------------------------------------------------------------------------ svn:mime-type = text/xml