Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 22 Oct 2009 10:00:38 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>
Subject: CVE Request -- Sahana

Hello Steve, vendors,

   Greg Miernicki reported a security issue in Sahana disaster management
system:

Sending a specially-crafted URL (with null character included
in the string) to Sahana, would allow an attacker to access any
file on the web server.

More from Greg:

"The first issue would allow an attacker to touch/modify any file on the system.
  Essentially the issue is that get, post, and requests aren't sanitized or
  unescaped."

References:
-----------
https://bugzilla.redhat.com/show_bug.cgi?id=530255
http://sourceforge.net/mailarchive/forum.php?thread_name=5d9043b70910191044l4bb0178fs563a5128a0f5db01%40mail.gmail.com&forum_name=sahana-maindev

Upstream patch:
---------------
http://sahana.cvs.sourceforge.net/viewvc/sahana/sahana-phase2/www/index.php?r1=1.83&r2=1.84

PoC:
----
http://sahana/index.php?stream=text&mod=/../../../../../../../../../../../etc/passwd%00

Could you allocate a CVE identifier?

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.