Rapid7 Vulnerability & Exploit Database

JRE XML Authentication Bypass

Back to Search

JRE XML Authentication Bypass

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
07/14/2009
Created
07/25/2018
Added
11/18/2009
Modified
09/13/2018

Description

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in the Sun JDK and JRE 6 Update 14 and earlier uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length. This allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

Solution(s)

  • jre-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;