Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201402100049.s1A0nGET009913@linus.mitre.org>
Date: Sun, 9 Feb 2014 19:49:16 -0500 (EST)
From: cve-assign@...re.org
To: gmc@...library.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: multiple issues in Koha

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://koha-community.org/security-release-february-2014/
> 
> Issues fixed with the release:

> [1] tools/pdfViewer.pl could be used to read arbitrary files on the server
> (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11660)

> my $tmpFileName = $cgi->param('tmpFileName');
> open FH, "<$tmpFileName";

Use CVE-2014-1922 for this issue involving absolute path traversal.


> [2] the staff interface help editor could be used to modify or create
> arbitrary files on the server
> (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11661)

> edithelp.pl can be used to write arbitrary files to the server

> To get it to write to /tmp, I had to count the number of directories
> upward and add a few ..-s in order to get to the root of the server
> and than to /tmp.

> Included in the following releases: 3.8.23, 3.10.13, 3.12.10, and 3.14.3.


> [3] member-picupload.pl could be used to write to arbitrary files on the server
> (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11662)

> open (my $upload_fh, '>', "$upload_dir/$filename");

> Included in the following releases: 3.8.23, 3.10.13, 3.12.10, and 3.14.3.

Use CVE-2014-1923 for both the edithelp.pl issue (Bug 11661) and the
member-picupload.pl issue (Bug 11662), apparently directory traversal
issues.


> [4] the MARC framework import/export function did not require
> authentication, ...
> (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11666)

Use CVE-2014-1924.


> [4] the MARC framework import/export function ... could be used to
> perform unexpected SQL commands
> (http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11666)

Use CVE-2014-1925.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJS+CGoAAoJEKllVAevmvmsqa4H/09BePODbfBm7UtPX/NTXeqh
K1W8Lrwy5nPotr129X8LPAxlXTGvpIZ/IFtrz+NpfoMSE1g8OEZcDiofZzlqDQ0d
FJ8032wXVCVRzLgOz/nQkMXdn8Koe0FgesPsXdivKFF3bGROnJ4O8DlIrk6NWoN0
P+dH7jL2u97KWIGzBoJaCw+9pYlKr2LHm+o7kyBINI9sYdqFdC6awrCVn4jnTrvg
5fGhGlIDdrIoQ3KD7lkR/rJRq0jLP3G8cb0W7kNyNQt4so9KzBJqrqb2Ix7TUJKk
mJhIaUua6SB2xtJI11ejCwVohphklCkbpow7G7mIvGbAufvzNeJY07AWhbnkb3w=
=Ru/L
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.