|
Message-Id: <201402100049.s1A0nGET009913@linus.mitre.org> Date: Sun, 9 Feb 2014 19:49:16 -0500 (EST) From: cve-assign@...re.org To: gmc@...library.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: multiple issues in Koha -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > http://koha-community.org/security-release-february-2014/ > > Issues fixed with the release: > [1] tools/pdfViewer.pl could be used to read arbitrary files on the server > (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11660) > my $tmpFileName = $cgi->param('tmpFileName'); > open FH, "<$tmpFileName"; Use CVE-2014-1922 for this issue involving absolute path traversal. > [2] the staff interface help editor could be used to modify or create > arbitrary files on the server > (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11661) > edithelp.pl can be used to write arbitrary files to the server > To get it to write to /tmp, I had to count the number of directories > upward and add a few ..-s in order to get to the root of the server > and than to /tmp. > Included in the following releases: 3.8.23, 3.10.13, 3.12.10, and 3.14.3. > [3] member-picupload.pl could be used to write to arbitrary files on the server > (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11662) > open (my $upload_fh, '>', "$upload_dir/$filename"); > Included in the following releases: 3.8.23, 3.10.13, 3.12.10, and 3.14.3. Use CVE-2014-1923 for both the edithelp.pl issue (Bug 11661) and the member-picupload.pl issue (Bug 11662), apparently directory traversal issues. > [4] the MARC framework import/export function did not require > authentication, ... > (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11666) Use CVE-2014-1924. > [4] the MARC framework import/export function ... could be used to > perform unexpected SQL commands > (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11666) Use CVE-2014-1925. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJS+CGoAAoJEKllVAevmvmsqa4H/09BePODbfBm7UtPX/NTXeqh K1W8Lrwy5nPotr129X8LPAxlXTGvpIZ/IFtrz+NpfoMSE1g8OEZcDiofZzlqDQ0d FJ8032wXVCVRzLgOz/nQkMXdn8Koe0FgesPsXdivKFF3bGROnJ4O8DlIrk6NWoN0 P+dH7jL2u97KWIGzBoJaCw+9pYlKr2LHm+o7kyBINI9sYdqFdC6awrCVn4jnTrvg 5fGhGlIDdrIoQ3KD7lkR/rJRq0jLP3G8cb0W7kNyNQt4so9KzBJqrqb2Ix7TUJKk mJhIaUua6SB2xtJI11ejCwVohphklCkbpow7G7mIvGbAufvzNeJY07AWhbnkb3w= =Ru/L -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.