Re: CVE-2020-13931 is Fake vulnerability

2020-12-22 Thread Apache Security Team
Dear r00t4dm;

Jonathan from Tomee PMC has already responded to you: We do not
provide further help or guidance to verify vulnerabilities.   We use
secur...@apache.org only for the reporting of new vulnerabilities.

Best Regards, Mark.

On Wed, Dec 23, 2020 at 4:32 AM r00t 4dm  wrote:
>
> Ok, Thanks for you help, maybe I need waiting the security team reply this 
> email.
> Lastnight I saw this vulnerability, Let me learn a lot.
> Five days age, I saw this vulnerability public in oss-security, I begin read 
> code from TomEE.
> I sure I read the VMTransportFactory.java I think the VMTransportFactory.java 
> have security vulnerability, because the VMTransportFactory start 
> brokerService ManagementContext doesn’t control.
> But I don’t know how to execution my code into the VMTransportFactory.java 
> flow.
> About this question, if you have some time, please tell me.
>
> Regards, r00t4dm
> Cloud-Penetrating Arrow Lab of Meituan Corp Information Security Department
>
> > 2020年12月23日 上午1:18,Jonathan Gallimore  写道:
> >
> > > maybe i wanna publish this vulnerable fully details in 
> > > https://paper.seebug.org/category/404team-en/
> > > i want to more Security researcher to learning this vulnerable.
> >
> > I've CC'd in the security email, in case they have a view on it. There's a 
> > bit of a delicate balance. In terms of the information the project itself 
> > gives out, we'd want to enable users to ensure they are not vulnerable 
> > whilst at same time not giving too much information to people who may wish 
> > to use it maliciously. Given that I worked on this, I'd probably be well 
> > placed to do a writeup on the issue myself.
> >
> > > by the way, i wanna to ask for you one questions.
> > > i'm 23 years old, I want to one day in the future join in apache security 
> > > PMC.
> > > What efforts do I need to make to join?
> >
> > Again, probably a question for the security team, rather than me (I'm not a 
> > member of the security team), but I'd suggest the following:
> >
> > * Start by reading this: https://www.apache.org/security/committers.html - 
> > this has the vulnerability disclosure process, and details the process by 
> > which a vulnerability is disclosed, fixed and released for ASF projects.
> > * Ensure anything you disclose for ASF projects follows that process
> > * Work with the projects to fix any issues; provide PRs, participate on the 
> > mailing lists
> > * There's a large number of projects at the ASF, maybe pick a couple and 
> > join their communities. TomEE is interesting as it brings a number of other 
> > ASF projects together to produce a server targeting the Java EE / Jakarta 
> > EE webprofile. Vulnerabilities in those projects may or may not have an 
> > affect on TomEE as well.
> >
> > Jon
> >
> > On Tue, Dec 22, 2020 at 4:55 PM r00t 4dm  wrote:
> > Hi,
> >
> > by the way, i wanna to ask for you one questions.
> > i'm 23 years old, I want to one day in the future join in apache security 
> > PMC.
> > What efforts do I need to make to join?
> >
> > r00t4dm
> > A-TEAM of Legendsec at Qi'anxin Group
> >
> >
> > r00t 4dm  于2020年12月23日周三 上午12:50写道:
> > maybe i wanna publish this vulnerable fully details in 
> > https://paper.seebug.org/category/404team-en/
> > i want to more Security researcher to learning this vulnerable.
> >
> > r00t4dm
> > A-TEAM of Legendsec at Qi'anxin Group
> >
> >
> > Jonathan Gallimore  于2020年12月23日周三 上午12:43写道:
> > Specifically, what it is you're looking to publish, and where?
> >
> > Jon
> >
> > On Tue, Dec 22, 2020 at 4:35 PM r00t 4dm  wrote:
> > Hi,
> >
> > I using testcase 
> > https://github.com/apache/tomee/commit/a2a06604f5d4e92e34c84715a30d03d3e7121fd1
> > i found how to open 1099 port, if i fully success, i can make this 
> > vulnerable public?
> >
> > r00t4dm
> > A-TEAM of Legendsec at Qi'anxin Group
> >
> >
> > r00t 4dm  于2020年12月23日周三 上午12:03写道:
> > Hi,
> >
> > Thank for you reply, i really want to know what configuration can open it 
> > 1099 port, I worked on this vulnerable for five days, Still nothing came of 
> > it.
> > I tested:
> >
> > 1.
> >
> >  
> > 
> >   
> >
> >   
> >   
> >
> >  
> >   BrokerXmlConfig=broker:(vm://broker)?useJmx=true
> >   ServerUrl=vm://broker?create=true
> > 
> > 
> >
> > 2.
> >
> > 
> > 
> >   
> >
> >   
> >   
> >
> >
> > 
> > BrokerXmlConfig=broker:(tcp://localhost:61616,network:static:tcp://10.211.55.2:61616)?useJmx=true
> > ServerUrl=vm://localhost?create=true
> > 
> >
> > 
> > ResourceAdapter = MyJmsResourceAdapter
> > 
> >
> >
> > 
> > ResourceAdapter = MyJmsResourceAdapter
> > 
> >
> > 
> > 
> >
> > 
> >
> > and more and more...
> >
> > but they all faild.
> >
> > Can you give me more details? Or is there any other way to get more details?
> > I think the vulnerable has been fixed. Can we make it public? i just want 
> > to learning...
> >
> > r00t4dm
> > A-TEAM of Legendsec at Qi'anxin Group
> >
> >
> > Jonathan Gallimore  于2020年12月22日周二 下午9:55写道:
> > Hi,
> >
> > 

Re: CVE-2020-13931 is Fake vulnerability

2020-12-22 Thread Jonathan Gallimore
> maybe i wanna publish this vulnerable fully details in
https://paper.seebug.org/category/404team-en/
> i want to more Security researcher to learning this vulnerable.

I've CC'd in the security email, in case they have a view on it. There's a
bit of a delicate balance. In terms of the information the project itself
gives out, we'd want to enable users to ensure they are not vulnerable
whilst at same time not giving too much information to people who may wish
to use it maliciously. Given that I worked on this, I'd probably be well
placed to do a writeup on the issue myself.

> by the way, i wanna to ask for you one questions.
> i'm 23 years old, I want to one day in the future join in apache security
PMC.
> What efforts do I need to make to join?

Again, probably a question for the security team, rather than me (I'm not a
member of the security team), but I'd suggest the following:

* Start by reading this: https://www.apache.org/security/committers.html -
this has the vulnerability disclosure process, and details the process by
which a vulnerability is disclosed, fixed and released for ASF projects.
* Ensure anything you disclose for ASF projects follows that process
* Work with the projects to fix any issues; provide PRs, participate on the
mailing lists
* There's a large number of projects at the ASF, maybe pick a couple and
join their communities. TomEE is interesting as it brings a number of other
ASF projects together to produce a server targeting the Java EE / Jakarta
EE webprofile. Vulnerabilities in those projects may or may not have an
affect on TomEE as well.

Jon

On Tue, Dec 22, 2020 at 4:55 PM r00t 4dm  wrote:

> Hi,
>
> by the way, i wanna to ask for you one questions.
> i'm 23 years old, I want to one day in the future join in apache security
> PMC.
> What efforts do I need to make to join?
>
> r00t4dm
> A-TEAM of Legendsec at Qi'anxin Group
>
>
> r00t 4dm  于2020年12月23日周三 上午12:50写道:
>
>> maybe i wanna publish this vulnerable fully details in
>> https://paper.seebug.org/category/404team-en/
>> i want to more Security researcher to learning this vulnerable.
>>
>> r00t4dm
>> A-TEAM of Legendsec at Qi'anxin Group
>>
>>
>> Jonathan Gallimore  于2020年12月23日周三 上午12:43写道:
>>
>>> Specifically, what it is you're looking to publish, and where?
>>>
>>> Jon
>>>
>>> On Tue, Dec 22, 2020 at 4:35 PM r00t 4dm  wrote:
>>>
 Hi,

 I using testcase
 https://github.com/apache/tomee/commit/a2a06604f5d4e92e34c84715a30d03d3e7121fd1
 i found how to open 1099 port, if i fully success, i can make this
 vulnerable public?

 r00t4dm
 A-TEAM of Legendsec at Qi'anxin Group


 r00t 4dm  于2020年12月23日周三 上午12:03写道:

> Hi,
>
> Thank for you reply, i really want to know what configuration can open
> it 1099 port, I worked on this vulnerable for five days, Still nothing 
> came
> of it.
> I tested:
>
> 1.
>
>  
> 
>   
>
>   
>   
>
>  
>   BrokerXmlConfig=broker:(vm://broker)?useJmx=true
>   ServerUrl=vm://broker?create=true
> 
> 
>
> 2.
>
> 
> 
>   
>
>   
>   
>
>
> 
>
> BrokerXmlConfig=broker:(tcp://localhost:61616,network:static:tcp://10.211.55.2:61616
> )?useJmx=true
> ServerUrl=vm://localhost?create=true
> 
>
>  type="javax.jms.ConnectionFactory">
> ResourceAdapter = MyJmsResourceAdapter
> 
>
>
> 
> ResourceAdapter = MyJmsResourceAdapter
> 
>
> 
> 
>
> 
>
> and more and more...
>
> but they all faild.
>
> Can you give me more details? Or is there any other way to get more
> details?
> I think the vulnerable has been fixed. Can we make it public? i just
> want to learning...
>
> r00t4dm
> A-TEAM of Legendsec at Qi'anxin Group
>
>
> Jonathan Gallimore  于2020年12月22日周二 下午9:55写道:
>
>> Hi,
>>
>> Thanks for your email about this issue. I've snipped out the images
>> from your email below, as they make the message quite large and cause 
>> some
>> mail lists to reject the message.
>>
>> When I received your email, I did do a check with a fresh vanilla
>> TomEE 7.1.3, with a simple application deployed, and a vulnerable
>> configuration. A JMX port was opened on tcp/1099 without authentication, 
>> so
>> I can confirm that TomEE 7.1.3 is vulnerable to this issue. We worked 
>> quite
>> extensively with the reporter to validate and reproduce the issue.
>>
>> There are a couple of things to note:
>>
>> * CVE-2020-13931 is the result of an incomplete fix for
>> CVE-2020-11969, and specifically there is an edge-case that will cause 
>> this
>> port to be opened up
>> * The edge-case we saw can be mitigated through a configuration
>> change or by upgrading.
>> * The configuration error 

Re: CVE-2020-13931 is Fake vulnerability

2020-12-22 Thread Jonathan Gallimore
Specifically, what it is you're looking to publish, and where?

Jon

On Tue, Dec 22, 2020 at 4:35 PM r00t 4dm  wrote:

> Hi,
>
> I using testcase
> https://github.com/apache/tomee/commit/a2a06604f5d4e92e34c84715a30d03d3e7121fd1
> i found how to open 1099 port, if i fully success, i can make this
> vulnerable public?
>
> r00t4dm
> A-TEAM of Legendsec at Qi'anxin Group
>
>
> r00t 4dm  于2020年12月23日周三 上午12:03写道:
>
>> Hi,
>>
>> Thank for you reply, i really want to know what configuration can open it
>> 1099 port, I worked on this vulnerable for five days, Still nothing came of
>> it.
>> I tested:
>>
>> 1.
>>
>>  
>> 
>>   
>>
>>   
>>   
>>
>>  
>>   BrokerXmlConfig=broker:(vm://broker)?useJmx=true
>>   ServerUrl=vm://broker?create=true
>> 
>> 
>>
>> 2.
>>
>> 
>> 
>>   
>>
>>   
>>   
>>
>>
>> 
>>
>> BrokerXmlConfig=broker:(tcp://localhost:61616,network:static:tcp://10.211.55.2:61616
>> )?useJmx=true
>> ServerUrl=vm://localhost?create=true
>> 
>>
>> 
>> ResourceAdapter = MyJmsResourceAdapter
>> 
>>
>>
>> 
>> ResourceAdapter = MyJmsResourceAdapter
>> 
>>
>> 
>> 
>>
>> 
>>
>> and more and more...
>>
>> but they all faild.
>>
>> Can you give me more details? Or is there any other way to get more
>> details?
>> I think the vulnerable has been fixed. Can we make it public? i just want
>> to learning...
>>
>> r00t4dm
>> A-TEAM of Legendsec at Qi'anxin Group
>>
>>
>> Jonathan Gallimore  于2020年12月22日周二 下午9:55写道:
>>
>>> Hi,
>>>
>>> Thanks for your email about this issue. I've snipped out the images from
>>> your email below, as they make the message quite large and cause some mail
>>> lists to reject the message.
>>>
>>> When I received your email, I did do a check with a fresh vanilla TomEE
>>> 7.1.3, with a simple application deployed, and a vulnerable configuration.
>>> A JMX port was opened on tcp/1099 without authentication, so I can confirm
>>> that TomEE 7.1.3 is vulnerable to this issue. We worked quite extensively
>>> with the reporter to validate and reproduce the issue.
>>>
>>> There are a couple of things to note:
>>>
>>> * CVE-2020-13931 is the result of an incomplete fix for CVE-2020-11969,
>>> and specifically there is an edge-case that will cause this port to be
>>> opened up
>>> * The edge-case we saw can be mitigated through a configuration change
>>> or by upgrading.
>>> * The configuration error was a simple error to make, and having an
>>> unwanted, unauthenticated JMX port open when it wasn't
>>> explicitly configured, so a further patch was worthwhile (hence the further
>>> CVE). There may be other usages of the server which may also have exposed
>>> this issue.
>>>
>>> I hope that answers your queries. We don't give out vulnerable
>>> configurations or specific reproduction steps for security issues. If you
>>> have follow-up questions for this, I'd encourage you to post on the
>>> us...@tomee.apache.org or dev@tomee.apache.org mailing lists. If you
>>> have other security related issues to report, secur...@apache.org is
>>> the address to report them (CC'd).
>>>
>>> Kind Regards
>>>
>>> Jon
>>>
>>>
>>> On Mon, Dec 21, 2020 at 2:37 PM r00t 4dm  wrote:
>>>
 Hello,

 in 2020/12/17 in oss-security email i see the [oss-security]
 CVE-2020-13931 Apache TomEE - Incorrect config on JMS Resource Adapter can
 lead to JMX being enabled this email

 here is the content about this email:

 Severity: High
> Vendor: The Apache Software Foundation
> Versions Affected:
> Apache TomEE 8.0.0-M1 - 8.0.3
> Apache TomEE 7.1.0 - 7.1.3
> Apache TomEE 7.0.0-M1 - 7.0.8
> Apache TomEE 1.0.0 - 1.7.5
> Description:
> If Apache TomEE is configured to use the embedded ActiveMQ broker, and
> the
> broker config is misconfigured, a JMX port is opened on TCP port 1099,
> which does not include authentication. CVE-2020-11969 previously
> addressed
> the creation of the JMX management interface, however the incomplete
> fix
> did not cover this edge case.
> Mitigation:
> - Upgrade to TomEE 7.0.9 or later
> - Upgrade to TomEE 7.1.4 or later
> - Upgrade to TomEE 8.0.4 or later
> Ensure the correct VM broker name is used consistently across the
> resource
> adapter config.
> Credit: Thanks to Frans Henskens for discovering and reporting this
> issue.


 So, I using TomEE 7.1.3 to test this vulnerability, i found
 this vulnerability is Fake.
 The Frans Henskens have some wrong.

 tomee.xml

 
 
   

   
   

 
 BrokerXmlConfig=broker:(vm://localhost:61616)
 ServerUrl = vm://localhost?async=true
 
 

 i use this to startup tomee 7.1.3.

 about CVE-2020-11969 security patch code in ActiveMQ5Factory.java
 This is done before start (managementContext.etCreateConnector(false);)

 So, let me see
 it can't call createConnector() function, because before start() is
 

Re: CVE-2020-13931 is Fake vulnerability

2020-12-22 Thread Mark J Cox
Hi  Jonathan

That's a perfect approach and reply suggestion, go for it!  I wonder too
sometimes if this is a tactic in order for a lazy researcher to try to gain
a reproducer.

(I wouldn't worry about cc'ing in private@tomee though, you probably don't
want to get that list too polluted, dev/user list is fine for followups).

Regards, Mark J Cox
ASF Security