|
|
Message-ID: <55B8E8F5.5010003@demlak.de>
Date: Wed, 29 Jul 2015 16:53:41 +0200
From: oss-security-list@...lak.de
To: oss-security@...ts.openwall.com
Subject: CVE request: Froxlor - information leak
Hello,
Please assign a CVE-ID for the following 'Information Leak':
Affects
=====
- Froxlor 0.9.33.1 and earlier
Fixed
====
- Froxlor 0.9.33.2
Summary
========
An unauthenticated remote attacker is able to get the database password
via webaccess due to wrong file permissions of the /logs/ folder in
froxlor version 0.9.33.1 and earlier. The plain SQL password and
username may be stored in the /logs/sql-error.log file. This directory
is publicly reachable under the default configuration/setup.
Notes
=====
Some default URLs are:
http://website.tld/froxlor/logs/sql-error.log
http://cp.website.tld/logs/sql-error.log
http://froxlor.website.tld/logs/sql-error.log
The certain section looks like this:
/var/www/froxlor/lib/classes/database/class.Database.php(279):
PDO->__construct('mysql:host=127....', 'DATABASE_USER',
'PLAIN_DATABASE_PW', Array)
Please note that the password in the logfile is truncated to 15 chars,
therefore passwords longer than 15 chars are not fully visible to an
attacker.
Patches
======
- log db errors to syslog instead of /logs/sql-error.log file:
https://github.com/Froxlor/Froxlor/commit/4ec376b29671593a50556630551e04e34bc83c1c
- replace passwords even before logging:
https://github.com/Froxlor/Froxlor/commit/8558533a9148a2a0302c9c177abff8e4e4075b92
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.