Debian: DSA-2857-1: libspring-java security update

    Date08 Feb 2014
    CategoryDebian
    120
    Posted ByLinuxSecurity Advisories
    It was discovered by the Spring development team that the fix for the XML External Entity (XXE) Injection (CVE-2013-4152) in the Spring Framework was incomplete.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2857-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                           Markus Koschany
    February 08, 2014                      http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : libspring-java
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2013-6429 CVE-2013-6430
    
    It was discovered by the Spring development team that the fix for the
    XML External Entity (XXE) Injection (CVE-2013-4152) in the Spring
    Framework was incomplete.
    
    Spring MVC's SourceHttpMessageConverter also processed user provided XML
    and neither disabled XML external entities nor provided an option to
    disable them. SourceHttpMessageConverter has been modified to provide an
    option to control the processing of XML external entities and that
    processing is now disabled by default.
    
    In addition Jon Passki discovered a possible XSS vulnerability:
    The JavaScriptUtils.javaScriptEscape() method did not escape all
    characters that are sensitive within either a JS single quoted string,
    JS double quoted string, or HTML script data context. In most cases this
    will result in an unexploitable parse error but in some cases it could
    result in an XSS vulnerability.
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 3.0.6.RELEASE-6+deb7u2.
    
    For the testing distribution (jessie), these problems have been fixed in
    version 3.0.6.RELEASE-11.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 3.0.6.RELEASE-11.
    
    We recommend that you upgrade your libspring-java packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"24","type":"x","order":"1","pct":54.55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.36,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.09,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.