diff --git a/src/site/site.xml b/src/site/site.xml index 30f6d21fb..ebf497130 100644 --- a/src/site/site.xml +++ b/src/site/site.xml @@ -24,15 +24,16 @@ - - - - - + + + + + + - - - + + + diff --git a/src/site/xdoc/security-reports.xml b/src/site/xdoc/security-reports.xml new file mode 100644 index 000000000..6c63d8c2e --- /dev/null +++ b/src/site/xdoc/security-reports.xml @@ -0,0 +1,111 @@ + + + + + Commons Collections Security Reports + Commons Documentation Team + + +
+

For information about reporting or asking questions about + security problems, please see the security page + of the Commons project.

+
+ +
+

This page lists all security vulnerabilities fixed in + released versions of Apache Commons Collections. Each + vulnerability is given a security impact rating by the + development team - please note that this rating may vary from + platform to platform. We also list the versions of Commons + Collections the flaw is known to affect, and where a flaw has not + been verified list the version with a question mark.

+ +

Please note that binary patches are never provided. If you + need to apply a source code patch, use the building + instructions for the Commons Collections version that you are + using.

+ +

If you need help on building Commons Collections or other help + on following the instructions to mitigate the known + vulnerabilities listed here, please send your questions to the + public Collections Users mailing + list.

+ +

If you have encountered an unlisted security vulnerability + or other unexpected behaviour that has security impact, or if + the descriptions here are incomplete, please report them + privately to the Apache Security Team. Thank you.

+ + +

High: Remote Code Execution during object de-serialization

+ +

The Apache Commons Collections library contains various classes + in the "functor" package which are serializable and use reflection. + This can be exploited for remote code execution attacks by injecting + specially crafted objects to applications that de-serialize + java objects from untrusted sources and have the Apache Commons Collections + library in their classpath and do not perform any kind of input + validation.

+ +

The implemented fix can be tracked via its related issue + COLLECTIONS-580:

+ +
    +
  • 3.2.2: de-serialization of unsafe classes in the functor package + will trigger an "UnsupportedOperationException" by default. In order to re-enable + the previous behavior, the system property + "org.apache.commons.collections.enableUnsafeSerialization" has to be set to "true".
  • +
  • 4.1: de-serialization support for unsafe classes in the functor package + has been completely removed (unsafe classes do not implement Serializable anymore).
  • +
+ +

The potential exploit was first presented at AppSecCali2015 [3] on 28 January 2015 by + Gabriel Lawrence and Chris Frohoff. Based on these exploits, Stephen Breen published + on 06 November 2015 attack scenarios [4] for various products like WebSphere, JBoss, Jenkins, + WebLogic, and OpenNMS. The Security team was not informed about these security + problems prior to their publication. No CVE id was assigned for the Apache Commons + Collections library, please refer to [1] or [2] for more information about the general + problem with Java serialization.

+ +

Affects: 3.0 - 4.0

+ +

Related links:

+ +
    +
  1. Vulnerability Report for Oracle Weblogic Server: + CVE-2015-4852
  2. +
  3. Apache Commons + statement + to widespread Java object de-serialisation vulnerability
  4. +
  5. + Presentation @ AppSecCali2015 by Lawrence and Frohoff
  6. +
  7. Attack scenarios + for various products by Stephen Breen
  8. +
+ +
+
+ +
+

Please report any errors or omissions to the dev mailing list.

+
+ +