How to Apply the Patch for Security Vulnerability CVE-2013-3925/CVE-2012-2926
This issue has been assigned CVE-2013-3925 by Mitre Corporation.
The previously reported issue CVE-2012-2926 (August 2012, CVSS score 6.4) was patched by introducing a new XFire servlet component into Crowd. The new component disables external entity resolution during XML parsing.
The new component has been configured to work for URLs with pattern /crowd/services/ but does not intercept calls to /crowd/services/2/ (etc).
The work for this issue has been tracked in CWD-3366 - Parsing of external XML entities can be exploited to retrieve files or make HTTP requests on the target network Resolved
Applying the Patch
The fix requires replacing the
xfire-servlet.xml file in the crowd-server jar. The patched version of the file can be used with Crowd 2.3.7, 2.4.1 and above, or any 2.5 or 2.6 release. See
xfire-servlet.xml attached to this issue.
For example, for Crowd 2.4.2:
We need to replace the current
xfire-servlet.xml file from
crowd-server-2.4.2.jar with the new
xfire-servlet.xml. Here's how:
- Download xfire-servlet.xml to this location:
Replace the old file with the new one. One way to do it without having to open the jar, replace the file, and recreate the jar is to perform the command below:
For older versions of Crowd:
You can manually edit the relevant jar file to remove the urlMap entries.
For Crowd 2.1.2 or 2.2.9, unzip the file crowd-server-*.*.*.jar file, e.g.:
Manually edit the xfire-servlet.xml to remove all urlMap entries other than the first key="/*" entry:
Save the file and recreate the jar, e.g.:
- Restart Crowd
Was this helpful?
Thanks for your feedback!