Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4EDEEAA3.3070104@redhat.com>
Date: Tue, 06 Dec 2011 21:25:07 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: cve@...re.org
Subject: Re: CVE request: includeViewParameters re-evaluates
 param/model values as EL expressions on Mojarra/MyFaces

On 11/28/2011 10:21 PM, Kurt Seifried wrote:
> On 11/28/2011 10:16 PM, David Jorm wrote:
>> It has been found that when includeViewParameters is set to true, JSF 2 as implemented by Mojarra and MyFaces will re-evaluate parameter/model values as EL expressions.
>>
>> Original bug:
>> http://java.net/jira/browse/JAVASERVERFACES-2247
>>
>> MyFaces bug:
>> https://issues.apache.org/jira/browse/MYFACES-3405
>>
>> Write-up/reproducer:
>> http://www.jakobk.com/2011/11/jsf-value-expression-injection-vulnerability/
>>
>> Thanks
> Please use CVE-2011-4358  for the Mojarra instance of this vulnerable.
>
> Please use CVE-2011-4359  for the MyFaces instance of this vulnerable.
>
And I have been informed that CVE-2011-4343 was previously assigned for
the Apache MyFaces issue, so CVE-2011-4359 is a duplicate and should be
rejected.

-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.