Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 2 May 2016 19:22:30 +0200
From: Andrew Shadura <andrew@...dura.me>
To: Kallithea <kallithea-general@...onservancy.org>
Cc: oss-security@...ts.openwall.com
Subject: [SECURITY ISSUES] CVE-2016-3691 and CVE-2016-3114

Hello everyone,

We've discovered the following security issues in Kallithea.

CVE-2016-3114: Privilege escalation
===================================

The vulnerability that allowed logged-in users to edit or
delete open pull requests associated with any repository to which
they had read access, plus a related vulnerability allowing logged-in
users to delete any comment from any repository, provided they could
determine the comment ID and had read access to just one repository.

CVE-2016-3691: CSRF protection bypass
=====================================

Routes allows GET requests to override the HTTP method, which breaks
the Kallithea CSRF protection (which only applies to POST requests).

The attacker might misuse GET requests method overriding to trick user
into issuing a request with a different method, thus bypassing the
CSRF protection.

Resolution
==========

Søren Løvborg wrote patches fixing these issues, both of which are
included in the release 0.3.2. Users are advised to upgrade as soon as
possible.

-- 
Cheers,
  Andrew



[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ