Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 31 Dec 2013 09:57:52 -0500 (EST)
From: cve-assign@...re.org
To: stephen.kenworthy@...le.oxon.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, henri@...v.fi,
        joernchen@...noelit.de
Subject: Re: CVE request: Fat Free CRM multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> I can confirm for issue 3 that the disclosure also involves to_xml.
> Please assign the additional CVE ID.

Use CVE-2013-7249.


> Re: denial of service, I don't believe this is an issue as the exploit
> only relates to read operations.

OK, there is no CVE assignment for this. Just for clarification, the
"denial of service" theory was related to:

  https://github.com/fatfreecrm/fat_free_crm/commit/cf26a04b356ad2161c4c6160260eb870a3de5328

specifically:

   -  resources :users, :id => /\d+/ do
   +  resources :users, :id => /\d+/, :except => [:index, :destroy] do

and:

   -   it "recognizes and generates #destroy" do
   -      { :delete => "/users/1" }.should route_to(:controller => "users", :action => "destroy", :id => "1")
   +    it "doesn't recognize #destroy" do
   +      { :delete => "/users/1" }.should_not be_routable

in which a reader might infer that a "destroy" of some data associated
with a user account would be a denial of service.

Our understanding now is that the presence of ":destroy" in the added
code string:

   , :except => [:index, :destroy]

does not prevent any type of attack, and therefore it is not a
vulnerability fix.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJSwtq0AAoJEKllVAevmvmsd7IH/1zw1OPyRZMnweFANOFheRMg
QfJxobXUXBHa30uZeRaOBujRNzx/ptTl0CrfyCSDpktcXQ803TW8MmfOCwEfzvym
8QtH41XTxkXDzVNujl5jtVCMCEw9+/zPYvvsRT9vrQPNp1F2cIkUxcggn3PGJ4Et
Exuo83rI5ciyWgPOdB/s748PhPNRPIw8rx5zahxw9fepsxNnlXngdpGmxa6dD4YU
NZ7pNjc2RpUq22gVcSks17/JnqetCrvkwmUgTHT0VbYhu/c+Zf7DUd/vL6uvkmxh
GUUJsmsP/oUwmWrw8a4m2/cKFYMjORsOYK1KU2IjhtezddiiysOtg6E/eEs1SZQ=
=RNUF
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.