CVE-2013-6440

Impact:
Moderate
Public Date:
2013-12-11
CWE:
CWE-611
Bugzilla:
1043332: CVE-2013-6440 XMLTooling-J/OpenSAML Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter
It was found that the ParserPool and Decrypter classes in the OpenSAML Java implementation resolved external entities, permitting XML External Entity (XXE) attacks. A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

Find out more about CVE-2013-6440 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Fuse MQ Enterprise 7.1.0 RHSA-2014:0452 2014-04-30
Red Hat JBoss BPMS 6.0 RHSA-2014:1291 2014-09-23
Red Hat JBoss Portal Platform 6.1 RHSA-2014:0195 2014-02-20
Fuse ESB Enterprise 7.1.0 RHSA-2014:0452 2014-04-30
Red Hat JBoss Enterprise Application Platform 6.2 RHSA-2014:0172 2014-02-13
Red Hat JBoss Enterprise Application Platform 6 for RHEL 6 Server (xmltooling) RHSA-2014:0171 2014-02-13
Fuse Management Console 7.1.0 RHSA-2014:0452 2014-04-30
Red Hat JBoss Fuse Service Works 6.0 RHSA-2014:1995 2014-12-15
Red Hat JBoss BRMS 6.0 RHSA-2014:1290 2014-09-23
Red Hat JBoss Enterprise Application Platform 6 for RHEL 5 Server (xmltooling) RHSA-2014:0170 2014-02-13

Affected Packages State

Platform Package State
Red Hat JBoss Portal 5 xmltooling Will not fix
Red Hat JBoss Operations Network 3 xmltooling Not affected
Red Hat JBoss EAP 5 xmltooling Will not fix
Red Hat JBoss Data Virtualization 6 xmltooling Not affected
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.

Acknowledgements

This issue was discovered by David Illsley, Ron Gutierrez of Gotham Digital Science, and David Jorm of the Red Hat Security Response Team.

External References

Last Modified