Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 22 Jan 2015 10:44:56 +1000
From: David Jorm <>
Subject: Defense4all security advisory: CVE-2014-8149 users can export report
 data to an arbitrary file on the server's filesystem

It was found that the defense4all framework's "dump" method allows a user
to request that report data is exported to a file on the server's
filesystem. The user can specify any path, and the server will write to it
with no validation. This could be used to perform a range of attacks. For
example, a critical file could be overwritten, thereby disabling the
defense4all server. On Windows servers, a UNC path could be injected,
potentially causing the server to write data to remote filesystems. An
attacker cannot control the contents of the file, but they can define a
report query that returns no results, and therefore force it to write an
empty file. An error message is received if the server cannot write to the
provided path. An attacker could therefore use this issue to map out the
writable filesystem on the server and potentially perform more advanced
attacks by manipulating special files in the /dev and /proc filesystems of
Linux servers.

It was also found that defense4all was using Spring 3.0.0 RC3. This
component is vulnerable to a number of vulnerabilities as listed on the
pivotal advisories page:
Full details including how to apply a patch are available on the
OpenDaylight security advisories page:

David Jorm on behalf of the OpenDaylight security response team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.