Note:
This project will be discontinued after December 13, 2021. [more]
2019-07-31
It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user.
Products | Icedtea\-Web, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_workstation |
Type | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) Improper Control of Generation of Code ('Code Injection') (CWE-94) |
First patch | - None (likely due to unavailable code) |
Patches |
• https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344
• https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327 |
Links |
• http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html
• https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html • http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html • https://seclists.org/bugtraq/2019/Oct/5 • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10182 |