Date: Sat, 3 Jan 2015 18:54:05 -0500 (EST) From: cve-assign@...re.org To: Dawa Ometto <d.l.a.ometto@...nl> cc: oss-security@...ts.openwall.com, cve-assign@...re.org Subject: Re: Re: CVE request: remote code execution vulnerability in gollum < 3.1.1 On Thu, 18 Dec 2014, Dawa Ometto wrote: > Resubmitting this (while fixing version number typo in the subject-line) > since it never did receive a CVE. > > On 04/12/14 22:08, Dawa Ometto wrote: >> Hi, >> >> I just released a fix for a remote code execution vulnerability in >> gollum . The vulnerable code was in the gollum-grit_adapter  ruby >> gem dependency as of gollum v3.1.0, but the exploitable code was also >> present before that version, in the gollum-lib  gem dependency (code >> was abstracted from gollum-lib to the new dependency). >> >> Type of vulnerability: remote code execution >> Attack outcome: run arbitrary commands, shell access >> Vulnerable versions: gollum < 3.1.1, gollum-lib < 4.0.1, >> gollum-grit_adapter < 0.1.1 >> Fix: `gem update gollum` will update the dependencies. >> Link to vulnerability/fix diff: >> https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7 >> Link to project issue: https://github.com/gollum/gollum/issues/913 >> >> Description: The bug exploits the fact that gollum uses the grit gem for >> git repository access, which makes command-line calls to `git grep` to >> search files. `git grep` has an `-O` or `--open-files-in-pager` option >> which can spawn an arbitrary process (to act as pager). In vulnerable >> versions of gollum, searching for the string `-O<arbitrary command>` or >> `--open-files-in-pager <arbritary command>` in the wiki's search field >> will execute an arbitrary shell command. However, this will only work if >> the string "master" (or more precisely, the name of the git branch that >> gollum is using) is found in one of the wiki's files: "master" is then >> interpreted as the search query, `-O<arbitary code>` as a command line >> option to `git grep`. >> >> The fix in the `gollum-grit_adapter` gem v.0.1.1 shell-escapes the >> user's query and removes any -O or --open-file-in-pager option from it. >> >>  https://github.com/gollum/gollum, https://rubygems.org/gems/gollum >>  https://github.com/gollum/grit_adapter >>  https://github.com/gollum/gollum-lib Use CVE-2014-9489. --- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.