|
Message-ID: <0f1139f3-ffca-d277-5208-2c2ed5dcc3cf@asokolov.org> Date: Wed, 18 Jul 2018 08:30:07 +0100 From: Alexey Sokolov <alexey+znc@...kolov.org> To: oss-security@...ts.openwall.com Subject: CVE-2018-14055: privilege escalation in ZNC Severity: high Versions affected: 1.6.0 through 1.7.0 Potentially, all earlier versions too, but there is no known way to trigger this before 1.6.0 Mitigation: upgrade to 1.7.1 Description: ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate privilege, inject rogue values into znc.conf, and gain shell access. Upstream patches: https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e https://github.com/znc/znc/commit/d22fef8620cdd87490754f607e7153979731c69d Reported by: Jeriko One <jeriko.one@....us> -- Best regards, Alexey "DarthGandalf" Sokolov
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.