
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN172
_____________________________________________________________________

DATE                : 02/04/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache NetBeans versions prior to
                                     11.3.

=====================================================================
http://mail-archives.apache.org/mod_mbox/netbeans-announce/202003.mbox/%3c5d2fe4aa529b2c630e7ec4035c3a92f329139008.camel@apache.org%3e
http://mail-archives.apache.org/mod_mbox/netbeans-announce/202003.mbox/%3c713ae341a40e6f4f55b25dfeb7b9112a02b3b778.camel@apache.org%3e
_____________________________________________________________________

CVE-ID
------
CVE-2019-17560

Summary
-------
The "Apache NetBeans" autoupdate system does not validate SSL
certificates and hostnames for https based downloads.

Versions Affected:
------------------
- All Apache NetBeans versions up to and including 11.2
- NetBeans releases before the Apache transition started may be
  also affected

Description:
------------
The "Apache NetBeans" autoupdate system does not validate SSL
certificates and hostnames for https based downloads. This allows
an attacker to intercept downloads of autoupdates and modify the
download, potentially injecting malicious code.

Mitigation:
-----------
- Disable autoupdates
- Manually download plugins to installed with a web browser
- Update to NetBeans 11.3 by downloading the release, verifying the
  signature and manually installing it

Credit:
-------
The investigation was triggered by a proof-of-concept submitted by
Emilian Bold

_____________________________________________________________________

CVE-ID
------
CVE-2019-17561

Summary
-------
The "Apache NetBeans" autoupdate system does not fully validate
code signatures.

Versions Affected:
------------------
- All Apache NetBeans versions up to and including 11.2
- NetBeans releases before the Apache transition started may be
  also affected

Description:
------------
The "Apache NetBeans" autoupdate system does not fully validate
code signatures. An attacker could modify the downloaded nbm and
include additional code.

Mitigation:
-----------
- Disable autoupdates
- Install only plugins from trusted sources and validate the
  downloads by checking signatures and/or comparing checksums
  from trusted sources
- Update to NetBeans 11.3 by downloading the release, verifying the
  signature and manually installing it

Credit:
-------
The investigation was triggered by a proof-of-concept submitted by
Emilian Bold


=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================




