Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAA7hUgHW=VwfsffPfFxvhZ=fS5fPf=79jZ-tdsCkZJgEfEksjA@mail.gmail.com>
Date: Thu, 21 Feb 2013 14:50:13 +0100
From: Raphael Geissert <atomo64@...il.com>
To: oss-security@...ts.openwall.com
Cc: 700158@...s.debian.org, 700159@...s.debian.org
Subject: Re: CVE request: XSS flaws fixed in ganglia

Hi again,

On 21 February 2013 11:47, Raphael Geissert <atomo64@...il.com> wrote:
> On 8 February 2013 19:06, Vincent Danen <vdanen@...hat.com> wrote:
>> A number of XSS issues were fixed in ganglia's web ui:
>>
>> https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e
>
> I've a hunch that there are a few issues with the changes. A quick
> look at the patch shows that the change here breaks the preg_replace
> call:

Forgot the reference, here's the exact code:
https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e#L7R17

[Salvatore, thanks for forwarding it]

Some other notes:

* https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e#L9R35

This is a directory traversal issue that requires authentication, but
there doesn't seem to be a CSRF protection in place (unless I'm
missing something).
The (stored) XSS part of it is not entirely fixed for the case where
an attacker successfully took advantage of it since the sanitation is
only performed when storing to the .json file.

The other operations related to views (in views_view.php) are all
still vulnerable to XSS via the view_name GET parameter.


The authentication cookie uses a persistent token for every user (no
session ids or any sort of nonce), which is an issue on its own, but
it also doesn't verify that the group stored in the cookie actually
corresponds to the user. As of 3.5.7 the groups feature still doesn't
seem to be in use, however.


So I guess we are going to need at least one more CVE id for the
remaining XSS issues in views_view.php and I leave the rest up to the
opinion of others (upstream included).

Cheers,
-- 
Raphael Geissert

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.