You're visiting the Crowd Knowledge Base. Visit the Crowd Knowledge Base Home for an overview.

Skip to end of metadata
Go to start of metadata

Description

This issue has been assigned CVE-2013-3925 by Mitre Corporation.

The previously reported issue CVE-2012-2926 (August 2012, CVSS score 6.4) was patched by introducing a new XFire servlet component into Crowd. The new component disables external entity resolution during XML parsing.

The new component has been configured to work for URLs with pattern /crowd/services/ but does not intercept calls to /crowd/services/2/ (etc).

The work for this issue has been tracked in  CWD-3366 - Parsing of external XML entities can be exploited to retrieve files or make HTTP requests on the target network Resolved

Applying the Patch

 The fix requires replacing the xfire-servlet.xml file in the crowd-server jar. The patched version of the file can be used with Crowd 2.3.7, 2.4.1 and above, or any 2.5 or 2.6 release. See xfire-servlet.xml attached to this issue.

For example, for Crowd 2.4.2:

We need to replace the current xfire-servlet.xml file from crowd-server-2.4.2.jar with the new xfire-servlet.xml. Here's how: 

  1. Download xfire-servlet.xml to this location: <your-crowd-install>/atlassian-crowd-2.4.2/crowd-webapp/WEB-INF/lib/
  2. Replace the old file with the new one. One way to do it without having to open the jar, replace the file, and recreate the jar is to perform the command below:

  3. Restart Crowd

For older versions of Crowd:

You can manually edit the relevant jar file to remove the urlMap entries.

  1. For Crowd 2.1.2 or 2.2.9, unzip the file crowd-server-*.*.*.jar file, e.g.:

  2.  Manually edit the xfire-servlet.xml to remove all urlMap entries other than the first key="/*" entry:

  3. Save the file and recreate the jar, e.g.:

  4. Restart Crowd
Help us improve!
Is this article helpful?
Is it well written?
Is the content complete?