This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ws-neethi.git


The following commit(s) were added to refs/heads/master by this push:
     new 92fd57d  Adding security site
92fd57d is described below

commit 92fd57d17101d3844cb7966be57d747fb468750f
Author: Colm O hEigeartaigh <[email protected]>
AuthorDate: Thu Apr 30 10:42:58 2026 +0100

    Adding security site
---
 src/site/apt/index.apt    |  1 +
 src/site/apt/security.apt | 75 +++++++++++++++++++++++++++++++++++++++++++++++
 src/site/site.xml         |  1 +
 3 files changed, 77 insertions(+)

diff --git a/src/site/apt/index.apt b/src/site/apt/index.apt
index 863bd9a..ff9a957 100644
--- a/src/site/apt/index.apt
+++ b/src/site/apt/index.apt
@@ -32,6 +32,7 @@ Latest Release
 
   \[{{{http://ws.apache.org/neethi/download.cgi}Download Neethi 3.2.2}}\]
 
+  Note that this release fixes three CVEs, please see 
{{{./security.html}Security Advisories (CVEs)}}.
 
 Key Features
 
diff --git a/src/site/apt/security.apt b/src/site/apt/security.apt
new file mode 100644
index 0000000..6eb90de
--- /dev/null
+++ b/src/site/apt/security.apt
@@ -0,0 +1,75 @@
+~~ Licensed to the Apache Software Foundation (ASF) under one
+~~ or more contributor license agreements. See the NOTICE file
+~~ distributed with this work for additional information
+~~ regarding copyright ownership. The ASF licenses this file
+~~ to you under the Apache License, Version 2.0 (the
+~~ "License"); you may not use this file except in compliance
+~~ with the License. You may obtain a copy of the License at
+~~
+~~ http://www.apache.org/licenses/LICENSE-2.0
+~~
+~~ Unless required by applicable law or agreed to in writing,
+~~ software distributed under the License is distributed on an
+~~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+~~ KIND, either express or implied. See the License for the
+~~ specific language governing permissions and limitations
+~~ under the License.
+
+           ------------------------
+           Apache Neethi - Security
+           ------------------------
+
+Security and CVE Tracking
+
+  This page tracks known vulnerabilities (CVEs) for Apache Neethi.
+
+  For reporting a new vulnerability, see
+  {{{https://www.apache.org/security/}Apache Security Team}}.
+
+Apache Neethi CVEs
+
+  * {{{https://www.cve.org/CVERecord?id=CVE-2026-42404}CVE-2026-42404}}:
+    Apache Neethi: Unrestricted HTTP Redirect Following in Policy References
+
+    * Severity: Medium
+
+    * Description:
+
+      Apache Neethi does not impose restrictions on URIs when manually
+      fetching remote policy references through the PolicyReference API.
+      When an application explicitly calls this API to retrieve a policy
+      from a remote URI, an outbound request may be made for arbitrary
+      protocols and internal IP addresses.
+
+      From 3.2.2, only http or https URIs are allowed, and link-local,
+      multicast, and any-local addresses are forbidden.
+
+    * Recommendation:
+
+      Users should upgrade to Apache Neethi 3.2.2 or later.
+
+  * {{{https://www.cve.org/CVERecord?id=CVE-2026-42403}CVE-2026-42403}}:
+    Apache Neethi: Circular Policy Reference Infinite Loop 
+
+    * Severity: High
+
+    * Description:
+
+      Apache Neethi does not properly detect circular references in policy 
definitions. When a WS-Policy document contains circular policy references 
(where Policy A references Policy B which references Policy A), the policy 
normalization process can enter an infinite loop or cause excessive recursion, 
leading to a stack overflow or application hang. An attacker can craft 
malicious policy documents with circular references to cause a Denial of 
Service condition
+
+    * Recommendation:
+
+      Users should upgrade to Apache Neethi 3.2.2 or later.
+
+  * {{{https://www.cve.org/CVERecord?id=CVE-2026-42402}CVE-2026-42402}}:
+    Apache Neethi: Policy Normalization Unbounded Resource Allocation DoS  
+
+    * Severity: High
+
+    * Description:
+
+      Apache Neethi is vulnerable to a Denial of Service attack through 
algorithmic complexity in policy normalization. Specially crafted WS-Policy 
documents can trigger an exponential Cartesian cross-product expansion during 
the normalization process, causing unbounded memory allocation that exhausts 
the JVM heap. This occurs when the normalization process generates an excessive 
number of policy alternatives without bounds, leading to runtime memory 
exhaustion.
+
+    * Recommendation:
+
+      Users should upgrade to 3.2.2 which limits the maximum number of 
normalized policy alternatives.
\ No newline at end of file
diff --git a/src/site/site.xml b/src/site/site.xml
index 81c26d9..096431d 100644
--- a/src/site/site.xml
+++ b/src/site/site.xml
@@ -51,6 +51,7 @@
     <menu name="Documentation">
       <item name="Javadocs" href="apidocs/index.html"/>
       <item name="Migration Guide" href="migration.html"/>
+      <item name="Security" href="security.html"/>
     </menu>
     <menu name="Project Information">
       <item name="Mailing Lists" href="mailing-lists.html"/>

Reply via email to