Java HTTP proxy vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===Java HTTP proxy vulnerability===

   Reference  wal-01
   Version    1.0
   Date       March 05, 2002

===Cross references

   Sun Security Bulletin               #00216
   Microsoft Security Bulletin       MS02-013

   Vulnerability identifier     CAN-2002-0058 (under review)
   http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0058

===Classifications

   Java, networking, HTTP
   Web browsers, applets 
   Unchecked network access, HTTP proxy connection hijacking

===Abstract problem description

   =Background
The Java security model is designed to allow code from an untrusted
source, usually web applets, to be safely executed.

   =Problem
An applet could do irregular, unchecked HTTP requests.

   =Consequence
Network access restrictions that apply, can be bypassed.
Only systems that have a HTTP proxy configured can be vulnerable.

One particular nasty exploit is where a remote server, aided by a
hostile applet, hijacks a browsers persistent HTTP connection to its
configured HTTP proxy.

===Affected software & patch availability; vendor bulletins

   =Sun

       Bulletin Number:  #00216
       Date:		 March 4, 2002
       Title:		 HttpURLConnection
       http://sunsolve.Sun.COM/pub-cgi/secBulletin.pl
       (At the time of this writing bulletin 216 was not available on
       the website yet.)

   =Microsoft

       Microsoft Security Bulletin  MS02-013
       Java Applet Can Redirect Browser Traffic
       Originally posted: March 04, 2002
       http://www.microsoft.com/technet/treeview/default.asp?
          url=/technet/security/bulletin/MS02-013.asp
       (URL is wrapped, please fix.)

   =Netscape
        Sun JVM (Java Virtual Machine) Issue
        http://home.netscape.com/security/


===Vendor contact
Shortly after I, more or less by coincidence, discovered the issue, I
reported it to Sun on April 07, 2001. They communicated it to their
Java licensees, and coordinated a synchronized response.

   =Free Java implementations
I audited both Kaffe and GNU Classpath class libraries, and to the
best of my knowledge, they are not vulnerable to this issue. Anyone
out there developing a free(TM) Java, please contact me if you have
questions or concerns, and I will be happy to assist you in any way I
can.

===Disclosure policy
I do not plan to release details of the vulnerability, that could make
it easier for crackers to get exploits, before a three month grace
period has expired. Customers should not to assume that the lack of
vulnerability details at this time will prevent the creation of
exploit programs.

===Detailed problem description
No details are provided at this time.
See Disclosure policy.

===PoC-exploit
I supplied Sun with a PoC-exploit, and they passed it on to other
vendors. No further distribution is expected.

===Software I tested/audited myself.
Sun/Blackdown	      1.1.7/8, 1.2.2, 1.3.0/1	linux/win32
Netscape 4.61	      default Java Runtime	linux
MSIE 5.0	      default Java Runtime	win32
HotJava Browser 3.0
Kaffe 1.06
GNU Classpath 0.03

===Acknowledgment
Thanks to the vendors for addressing the issue. Special thanks to
Sun, in particular Chok Poh, for coordinating.

===Disclaimer & Copying
This comes with ABSOLUTELY NO WARRANTY!
Copying in whole and quoting parts permitted.

===History
Version 1.0 is the first release of this document.
Updates    http://www.xs4all.nl/~harmwal/issue/wal-01.txt

===Contact
Author     Harmen van der Wal
Mail	   harmwal@xs4all.nl
PGP	   http://www.xs4all.nl/~harmwal/harmen.pgp.txt

===End===

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8hBnWqX9LFhm8cvYRAsXwAJ4jr1pm6lTqarPmbZNhuc4gGAwNSACeMIg9
nEyfEY6Us0AxLR0FoKFM/Q0=
=a9rw
-----END PGP SIGNATURE-----

-- 
Harmen van der Wal - http://www.xs4all.nl/~harmwal/



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux