Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 22 Sep 2015 18:51:01 +0200
From: us3r777 <us3r777@...0.so>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: CVE requests - Contact Form 7, eZPublish (EZSA-2015-001), Prestashop

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi,

Could a CVE please be assigned to these issues ?

Issue 1:
Software: Contact Form 7 (Wordpress plugin)
Type of vulnerability: The Captcha is predictible using seed recovery
attack (mt_rand)
Exploitation vectors: The plugin use the output of mt_rand() function
as a prefix for the Captcha filename. These outputs can be used to
recover the initial seed, which can be used to predict the content of
the Captcha.
Attack outcome: The captcha functionnality can be totally bypass.
Patch:
https://github.com/wp-plugins/contact-form-7/commit/6e75a825829b00c2f645
acc67ea14ccfd7e54ceb
Bug entry: N/A
Security advisory: http://contactform7.com/2015/03/14/contact-form-7-411
/
Affected versions: Contact Form 7 < 4.1.1
Fixed versions: Contact Form 7 4.1.1 or higher
Already requested: Yes, via cve-assign@...re.org, I never got any answer
Open source software request.

Issue 2:
Software: eZPublish
Type of vulnerability: Password recovery token predictible using seed
recovery attack.
Exploitation vectors: Using a valid user account a malicious user can
get outputs from mt_rand and predict another user token.
Attack outcome: A malicious user can get access to other users accounts.
Patch:
https://github.com/ezsystems/ezpublish-legacy/commit/5908d5ee65fec61ce0e
321d586530461a210bf2a
Bug entry: https://jira.ez.no/browse/EZP-24140 (not public)
Security advisory:
http://share.ez.no/community-project/security-advisories/ezsa-2015-001-p
otential-vulnerability-in-ez-publish-password-recovery
(partially public)
Affected versions: 4.5.0, 4.6.0, 4.7.0, 5.0, 5.1, 5.2, 2015.01, 5.3.4,
5.4.1.1
Fixed versions:  4.5 Maintenance, 4.6 Maintenance, 4.7 Maintenance,
5.0 Maintenance, 5.1 Maintenance, 5.2 Maintenance, 5.3.5, 5.4.2, 2015.03
Already requested: Yes, via cve-assign@...re.org, I never got any answer
Open source software request.

Issue 3:
Software: Prestashop
Type of vulnerability: Password recovery token predictible using seed
recovery attack.
Exploitation vectors: Using a valid user account a malicious user can
get outputs from mt_rand and predict another user token and generated
password.
Attack outcome: A malicious user can get access to other users accounts.
Patch:
https://github.com/PrestaShop/PrestaShop/commit/dcb1f8000ecf474375933730
91ae56c4ffdf42ac
Bug entry: N/A
Security advisory:
https://www.prestashop.com/blog/en/prestashop-security-release/
Affected versions: 1.4.x, 1.5.x, and 1.6.x up to 1.6.0.14.
Fixed versions: 1.4.11.1, 1.5.6.3 and 1.6.1.0
Already requested: Yes, via cve-assign@...re.org, I never got any answer
Open source software request.

If you have any questions regarding this request, please do not
hesitate to contact me.

Gratefully,
Vincent Herbulot
@us3r777
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=ueBr
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.