tiles: CVE-2023-49735

Related Vulnerabilities: CVE-2023-49735  

Debian Bug report logs - #1057315
tiles: CVE-2023-49735

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 3 Dec 2023 10:03:01 UTC

Severity: important

Tags: security, upstream

Found in version tiles/3.0.7-5

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, apo@debian.org, ebourg@apache.org, carnil@debian.org, team@security.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>:
Bug#1057315; Package src:tiles. (Sun, 03 Dec 2023 10:03:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to apo@debian.org, ebourg@apache.org, carnil@debian.org, team@security.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>. (Sun, 03 Dec 2023 10:03:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: tiles: CVE-2023-49735
Date: Sun, 03 Dec 2023 11:00:08 +0100
Source: tiles
Version: 3.0.7-5
Severity: important
Tags: security upstream
X-Debbugs-Cc: apo@debian.org, ebourg@apache.org, carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for tiles.

CVE-2023-49735[0]:
| ** UNSUPPORTED WHEN ASSIGNED **  The value set as the
| DefaultLocaleResolver.LOCALE_KEY attribute on the session was not
| validated while resolving XML definition files, leading to possible
| path traversal and eventually SSRF/XXE when passing user-controlled
| data to this key. Passing user-controlled data to this key may be
| relatively common, as it was also used like that to set the language
| in the 'tiles-test' application shipped with Tiles.  This issue
| affects Apache Tiles from version 2 onwards.  NOTE: This
| vulnerability only affects products that are no longer supported by
| the maintainer.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

The project is dead-upstream TTBOMK, so not sure if/what we can do at
all for this issue. Removal seems not possible as per:

carnil@respighi:~$ dak rm --suite=unstable -n -R tiles
Will remove the following packages from unstable:

libtiles-java |    3.0.7-5 | all
libtiles-java-doc |    3.0.7-5 | all
     tiles |    3.0.7-5 | source

Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>

------------------- Reason -------------------

----------------------------------------------

Checking reverse dependencies...
# Broken Build-Depends:
libspring-java: libtiles-java (>= 3.0)

Dependency problem found.

carnil@respighi:~$

But maybe we can set it as "no-dsa", is it only used as build
dependency for libspring-java and not sensible outside?

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-49735
    https://www.cve.org/CVERecord?id=CVE-2023-49735

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>:
Bug#1057315; Package src:tiles. (Sun, 03 Dec 2023 14:15:04 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>. (Sun, 03 Dec 2023 14:15:04 GMT) (full text, mbox, link).


Message #10 received at 1057315@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <jmm@inutil.org>
To: Salvatore Bonaccorso <carnil@debian.org>, 1057315@bugs.debian.org
Subject: Re: Bug#1057315: tiles: CVE-2023-49735
Date: Sun, 3 Dec 2023 15:10:53 +0100
Salvatore Bonaccorso wrote:
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> The project is dead-upstream TTBOMK, so not sure if/what we can do at
> all for this issue. Removal seems not possible as per:
> 
> carnil@respighi:~$ dak rm --suite=unstable -n -R tiles
> Will remove the following packages from unstable:
> 
> libtiles-java |    3.0.7-5 | all
> libtiles-java-doc |    3.0.7-5 | all
>      tiles |    3.0.7-5 | source
> 
> Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>
> 
> ------------------- Reason -------------------
> 
> ----------------------------------------------
> 
> Checking reverse dependencies...
> # Broken Build-Depends:
> libspring-java: libtiles-java (>= 3.0)
> 
> Dependency problem found.
> 
> carnil@respighi:~$
> 
> But maybe we can set it as "no-dsa", is it only used as build
> dependency for libspring-java and not sensible outside?

Spring is already marked as unsupported, so we can simply extend that.

Cheers,
        Moritz



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>:
Bug#1057315; Package src:tiles. (Sun, 03 Dec 2023 14:39:06 GMT) (full text, mbox, link).


Acknowledgement sent to Markus Koschany <apo@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>. (Sun, 03 Dec 2023 14:39:06 GMT) (full text, mbox, link).


Message #15 received at 1057315@bugs.debian.org (full text, mbox, reply):

From: Markus Koschany <apo@debian.org>
To: Moritz Muehlenhoff <jmm@inutil.org>, 1057315@bugs.debian.org, Salvatore Bonaccorso <carnil@debian.org>
Subject: Re: Bug#1057315: tiles: CVE-2023-49735
Date: Sun, 03 Dec 2023 15:35:31 +0100
[Message part 1 (text/plain, inline)]
Am Sonntag, dem 03.12.2023 um 15:10 +0100 schrieb Moritz Muehlenhoff:
> > But maybe we can set it as "no-dsa", is it only used as build
> > dependency for libspring-java and not sensible outside?
> 
> Spring is already marked as unsupported, so we can simply extend that.

+1 This is sensible in this case.
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>:
Bug#1057315; Package src:tiles. (Sun, 03 Dec 2023 20:03:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>. (Sun, 03 Dec 2023 20:03:03 GMT) (full text, mbox, link).


Message #20 received at 1057315@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Markus Koschany <apo@debian.org>, 1057315@bugs.debian.org
Cc: Moritz Muehlenhoff <jmm@inutil.org>
Subject: Re: Bug#1057315: tiles: CVE-2023-49735
Date: Sun, 3 Dec 2023 20:59:22 +0100
Control: clone -1 -2 -3
Control: retitle -2 tiles: Add README.Debian.security to document support status
Control: reassign -3 src:debian-security-support
Control: retitle -3 Mark tiles as only supported for building applications shipped in Debian 

Hi,

On Sun, Dec 03, 2023 at 03:35:31PM +0100, Markus Koschany wrote:
> Am Sonntag, dem 03.12.2023 um 15:10 +0100 schrieb Moritz Muehlenhoff:
> > > But maybe we can set it as "no-dsa", is it only used as build
> > > dependency for libspring-java and not sensible outside?
> > 
> > Spring is already marked as unsupported, so we can simply extend that.
> 
> +1 This is sensible in this case.

Ok your both reasoning make sense.

So adding a README.Debian.security on a next upload to clarify the
situation for only beeing supported for building applications shipped
in Debian.

And then as well a debian-security-support entry.

Cloning and reassigning accordingly two bugs.

Regards,
Salvatore



Bug 1057315 cloned as bugs 1057342, 1057343 Request was from Salvatore Bonaccorso <carnil@debian.org> to 1057315-submit@bugs.debian.org. (Sun, 03 Dec 2023 20:03:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Mon Dec 4 08:17:41 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.