Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: CVE-2017-7239-8662@webweaving.org
Date: Mon, 3 Apr 2017 12:22:15 +0200 (CEST)
From: Dirk-Willem van Gulik <dirkx@...weaving.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2017-7239: ninka license identification tool:  insufficient escaping of external input [vs]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


             ninka license identification tool
          insufficient escaping of external input

                CVE-2017-7239 / CVSS 9.3
                        1.07

The ninka license identification tool does not properly escape
special characters in the files it encounters - such as the ‘&’.

In case of an alien code bases; or a code base that is brought in for
examination - a third party may doctor the file names as to cause 
a certain result of the license compliance scan. Or the attacker may 
adversely affect the ninka user their environment (e.g. an automated
continuous integration setup) by causing it to hang.

This can then lead to unauthorised disclosure of information,
unreliable compliance information or a denial of services.

Versions affected: 
- - ------------------
All versions up to and including version 1.3.0.

Resolution:
- - -----------
Upgrade to version 1.3.2 or later - available on
https://github.com/dmgerman/ninka. 

Mitigations and work arounds:
- - -----------------------------
Test the filenames passed for obvious issues. Given that ninka is
generally only applied to (source)code - a regex matching just
the alphanumerics and a few glyphs such as the dash and dot
can usually be applied.

Credits and timeline
- - --------------------
The flaw was found and reported by Dirk-Willem van Gulik <dirkx
@ webweaving.org) on the 12 of March 2017. D.M. German <dmg
@ turingmachine.org >  fixed the issue on the 27th of March 2017.

2017-01-28	vulnerability found, reported to authors.
2017-03-21	sample found in alien codebase.
2017-03-23	reported to more recent email addresses of authors .
2017-03-26	reported to the authors by phone.
2017-03-27	CVE issued by mitre. fix created by author and
                pushed to github (1.3.1)
2017-04-01	Full disclosure process started.
2017-04-03	Updated the advisory; an improverd fix is
                present in version 1.3.2.

Common Vulnerability Scoring (Version 3) and vector
- - ---------------------------------------------------
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RC:R/CR:L/IR
  :L/AR:L/MAV:L/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H

CVSS Base Score          9.3
CVSS Temporal Score      9.0
CVSS Environmental Score 6.4

1.07 / : 2719 $
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0

iEYEARECAAYFAljiIlAACgkQ/W+IxiHQpxsahQCeJLsg0CkHAPQOUymwDM54R7Qj
CMEAoOtJVpgi76+CqprE/q6G+JzHur+y
=jRAl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.