Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 21 Sep 2017 16:50:07 +0200
From: Thomas Jarosch <thomas.jarosch@...ra2net.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: code execution in Horde_Image 2.0.0 to 2.5.1

Hello oss security,

Intra2net AG found a code execution vulnerability in the "Horde_Image" library 
of the Horde framework (https://www.horde.org/). The "_raw()" function of the 
ImageMagick "im" backend passes the "$index" parameter unsanitized to the 
shell. This parameter is f.e. exposed by the getImageAtIndex($index) function.

No core horde application exposes the $index parameter directly
to the net, so a "remote" code execution might be given for third party 
applications only. Read: The risk is low for normal horde users.

Affected versions are 2.0.0 to 2.5.1.
A fixed version 2.5.2 has been released.

Upstream fix:
https://github.com/horde/horde/commit/eb3afd14c22c77ae0d29e2848f5ac726ef6e7c5b

Official release announcement:
https://marc.info/?l=horde-announce&m=150600299528079&w=2
-----------------------------------
Hello,

a Remote Code Execution vulnerability has been found in the  
Horde_Image library when using the "Im" backend that utilizes  
ImageMagick's "convert" utility. It's not exploitable through any  
Horde application, because the code path to the vulnerability is not  
used by any Horde code. Custom applications using the Horde_Image  
library might be affected though. This vulnerability affects all  
versions of Horde_Image from 2.0.0 to 2.5.1.

A fixed version of the Horde_Image (version 2.5.2) library has already  
been released and everybody is advised to upgrade to Horde_Image 2.5.2  
as soon as possible.

Thanks to long-time contributor and supporter Thomas Jarosch  
<thomas.jarosch@...ra2net.com> for discovering and reporting these  
vulnerabilities.

--
Jan Schneider
The Horde Project
https://www.horde.org/
-----------------------------------


Timeline:
2017-09-15: Found the issue during manual code review
            after the recent CVE-2017-9773 issue.

2017-09-15: Sent patch to security@...de.org

2017-09-16: Checked horde code base if any horde core
            application exposes the vulnerable API.

2017-09-19: Wrote to security@...de.org again
            that the security risk for core horde apps is low,
            no embargo via linux-distros@ needed.

2017-09-19: Fix is committed to git.

2017-09-21: Release of fixed version 2.5.2 by the Horde project.


Thanks to Jan Schneider of the Horde project
for the timely release of the fixed version.


Best regards,
Thomas Jarosch / Intra2net AG

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ