|
Message-Id: CVE-2017-7239-8662@webweaving.org Date: Mon, 3 Apr 2017 12:22:15 +0200 (CEST) From: Dirk-Willem van Gulik <dirkx@...weaving.org> To: oss-security@...ts.openwall.com Subject: CVE-2017-7239: ninka license identification tool: insufficient escaping of external input [vs] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ninka license identification tool insufficient escaping of external input CVE-2017-7239 / CVSS 9.3 1.07 The ninka license identification tool does not properly escape special characters in the files it encounters - such as the ‘&’. In case of an alien code bases; or a code base that is brought in for examination - a third party may doctor the file names as to cause a certain result of the license compliance scan. Or the attacker may adversely affect the ninka user their environment (e.g. an automated continuous integration setup) by causing it to hang. This can then lead to unauthorised disclosure of information, unreliable compliance information or a denial of services. Versions affected: - - ------------------ All versions up to and including version 1.3.0. Resolution: - - ----------- Upgrade to version 1.3.2 or later - available on https://github.com/dmgerman/ninka. Mitigations and work arounds: - - ----------------------------- Test the filenames passed for obvious issues. Given that ninka is generally only applied to (source)code - a regex matching just the alphanumerics and a few glyphs such as the dash and dot can usually be applied. Credits and timeline - - -------------------- The flaw was found and reported by Dirk-Willem van Gulik <dirkx @ webweaving.org) on the 12 of March 2017. D.M. German <dmg @ turingmachine.org > fixed the issue on the 27th of March 2017. 2017-01-28 vulnerability found, reported to authors. 2017-03-21 sample found in alien codebase. 2017-03-23 reported to more recent email addresses of authors . 2017-03-26 reported to the authors by phone. 2017-03-27 CVE issued by mitre. fix created by author and pushed to github (1.3.1) 2017-04-01 Full disclosure process started. 2017-04-03 Updated the advisory; an improverd fix is present in version 1.3.2. Common Vulnerability Scoring (Version 3) and vector - - --------------------------------------------------- CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RC:R/CR:L/IR :L/AR:L/MAV:L/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H CVSS Base Score 9.3 CVSS Temporal Score 9.0 CVSS Environmental Score 6.4 1.07 / : 2719 $ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0 iEYEARECAAYFAljiIlAACgkQ/W+IxiHQpxsahQCeJLsg0CkHAPQOUymwDM54R7Qj CMEAoOtJVpgi76+CqprE/q6G+JzHur+y =jRAl -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.