|
Message-ID: <4AE01126.2010202@redhat.com> Date: Thu, 22 Oct 2009 10:00:38 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com> Subject: CVE Request -- Sahana Hello Steve, vendors, Greg Miernicki reported a security issue in Sahana disaster management system: Sending a specially-crafted URL (with null character included in the string) to Sahana, would allow an attacker to access any file on the web server. More from Greg: "The first issue would allow an attacker to touch/modify any file on the system. Essentially the issue is that get, post, and requests aren't sanitized or unescaped." References: ----------- https://bugzilla.redhat.com/show_bug.cgi?id=530255 http://sourceforge.net/mailarchive/forum.php?thread_name=5d9043b70910191044l4bb0178fs563a5128a0f5db01%40mail.gmail.com&forum_name=sahana-maindev Upstream patch: --------------- http://sahana.cvs.sourceforge.net/viewvc/sahana/sahana-phase2/www/index.php?r1=1.83&r2=1.84 PoC: ---- http://sahana/index.php?stream=text&mod=/../../../../../../../../../../../etc/passwd%00 Could you allocate a CVE identifier? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.