Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 7 Jan 2019 10:30:30 -0500
From: "James E. King III" <jking@...che.org>
To: oss-security@...ts.openwall.com, security <security@...che.org>, 
	dev@...ift.apache.org, user@...ift.apache.org
Subject: [SECURITY] CVE-2018-11798 Announcement

Reported By: Asger Feldthaus
Vendor: The Apache Software Foundation
Product: Apache Thrift
Problem Type: Improper Access Control
Versions Affected: Apache Thrift versions 0.9.2 through 0.11.0
Mitigation: Upgrading to the latest 0.12.0 release

Description:
The Apache Thrift Node.js static file server has been determined to have a
security vulnerability in it which a remote user has the ability to access
files outside the set webservers docroot path.

Resolution:
The code which sets the visible path for the static files to be served will
now verify that the requested path is within the specified webservers
docroot path and not allow a malicious user to escape out of the configured
path.

Jira issue:
 - https://issues.apache.org/jira/browse/THRIFT-4647

Mitre issue:
  - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11798

Committed resolution:
 -
*https://github.com/apache/thrift/commit/2a2b72f6c8aef200ecee4984f011e06052288ff2
<https://github.com/apache/thrift/commit/2a2b72f6c8aef200ecee4984f011e06052288ff2>*

On behalf of the Apache Thrift PMC,

Thank you

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.