Update:

Some more data has emerged, and after inquiring with JFrog, they pointed me to 
the issue being connected to what is under work in 
https://jira.qos.ch/browse/LOGBACK-1574 and 
https://github.com/qos-ch/logback/pull/305.

It seems the root of the concern is the hostname validation.

Angelo

From: Angelo Rauseo <[email protected]>
Date: Tuesday, September 7, 2021 at 09:00
To: logback users list <[email protected]>
Subject: Re: [External Sender] Re: [logback-user] Ambiguous vulnerability 
assessment help

Ciao David,

Thank you for your reply and the recommendations. I am trying to reach out to 
JFrog and to see what data they have, and I think it is reasonable to not use 
logback apis to reach out to servers via TLS/SSL to stay safe.

Even with all the precautions, I am still a bit confused by the lack of details 
and somewhat concerned about finding the root cause of a MiTM issue.

Is there anyone here with experience of TLS connectivity in logback? Which 
would be the APIs involved?

Thanks for your time,
Angelo

From: logback-user <[email protected]> on behalf of David Roussel 
<[email protected]>
Reply-To: logback users list <[email protected]>
Date: Saturday, September 4, 2021 at 02:10
To: logback users list <[email protected]>
Subject: [External Sender] Re: [logback-user] Ambiguous vulnerability 
assessment help

Ciao Angelo,

To reproduce this might take quite a bit of work, as the report you copied 
doesn’t provide details of how the MITM cert was spoofed.  It might be as 
simple as not validating the cert at all.  But if you have support from JFrog, 
then I would be best to contact them for more details.

I don’t currently use logback myself, but when I did I never relied on any 
feature that connected out to TLS endpoints.  If you don’t either, then you can 
ignore this issue.

If your logback usage does include connecting out to TLS endpoints, then in 
each case you need to consider how confidential is that data, what could the 
impact of a MITM be, and what control do you have over the cert validation.

The problem is that there are many ways in which TLS connections can be made, 
even just parsing an XML document can cause network requests.

David


On 27 Aug 2021, at 17:31, Angelo Rauseo 
<[email protected]<mailto:[email protected]>> wrote:

Hello everyone,

I am looking for details about a vulnerability listed in JFrog X-Ray (see 
below) that does not have much data attached to it in the report (no CVE, no 
links to analysis). My end goal would be to eventually help resolve it, but I 
have no data about the source to start from.

Anyone here that can help me assess it?

Thank you for your time and assistance!
Angelo

┌─────────────────────┬────────────────────────────────────────────────────────────────────────────────────────────────────┐
│ Summary             │ logback SSL Certificate Validation Failure MitM 
Spoofing                                           │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Severity            │ MEDIUM                                                  
                                           │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Description         │ logback contains a flaw as X.509 certificates are not 
properly validated. By spoofing the  TLS/SSL │
│                     │ server via a certificate that appears valid, an 
attacker with the  ability  to  intercept  network │
│                     │ traffic (e.g. MitM, DNS cache poisoning) can disclose 
and optionally manipulate transmitted data.  │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Type                │ SECURITY                                                
                                           │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Provider            │ JFrog                                                   
                                           │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Issues              │ 4.0/CVSS:2.0/AV:N/AC:H/Au:N/C:P/I:P/A:N                 
                                           │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Edited              │ 2021-04-15T09:22:04Z                                    
                                           │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Created             │ 2019-05-02T00:00:00.297Z                                
                                           │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Impact paths        │ -                                                       
                                           │
│                     │ 
/sha256__11533f8a115abc3bbf6840bebe91a8616a0ee04cd4bdad4094ed62e6f86d4432.tar.gz/usr/share/fugu/li
 │
│                     │ b/ch.qos.logback-logback-core-1.2.3.jar                 
                                           │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│                     │                   Affected component ID: 
gav://ch.qos.logback:logback-core:1.2.3                   │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Vulnerable versions │ 1.0.12 ≤ Version ≤ 1.3.0-alpha5                         
                                           │
├─────────────────────┼────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Fixed versions      │                                                         
                                           │
└─────────────────────┴────────────────────────────────────────────────────────────────────────────────────────────────────┘


_______________________________________________
logback-user mailing list
[email protected]<mailto:[email protected]>
http://mailman.qos.ch/mailman/listinfo/logback-user<https://urldefense.proofpoint.com/v2/url?u=http-3A__mailman.qos.ch_mailman_listinfo_logback-2Duser&d=DwMFaQ&c=DS6PUFBBr_KiLo7Sjt3ljp5jaW5k2i9ijVXllEdOozc&r=QDRlV20Ri1l0kzdezi8EjKLiEjyGGL8ZdxIoltJLy7w&m=JqVy4JZWTjrqpf01CGLjtKp98ub0RSqr9FTer4EqbhU&s=FAuAnoQCWjXeiTNsJTd_yO73o5kYhBOcw7ak8oj9brI&e=>

_______________________________________________
logback-user mailing list
[email protected]
http://mailman.qos.ch/mailman/listinfo/logback-user

Reply via email to