Multiple security issues

Debian Bug report logs - #709836
Multiple security issues

version graph

Reported by: Dominic Hargreaves <dom@earth.li>

Date: Sat, 25 May 2013 21:09:06 UTC

Severity: serious

Found in versions request-tracker4/4.0.12-1, request-tracker4/4.0.7-5

Fixed in versions request-tracker4/4.0.7-5+deb7u2, 4.0.12-2

Done: Dominic Hargreaves <dom@earth.li>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Request Tracker Group <pkg-request-tracker-maintainers@lists.alioth.debian.org>:
Bug#709836; Package src:request-tracker4. (Sat, 25 May 2013 21:09:10 GMT) (full text, mbox, link).


Acknowledgement sent to Dominic Hargreaves <dom@earth.li>:
New Bug report received and forwarded. Copy sent to Debian Request Tracker Group <pkg-request-tracker-maintainers@lists.alioth.debian.org>. (Sat, 25 May 2013 21:09:10 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Dominic Hargreaves <dom@earth.li>
To: submit@bugs.debian.org
Subject: Multiple security issues
Date: Sat, 25 May 2013 22:05:53 +0100
[Message part 1 (text/plain, inline)]
Source: request-tracker4
Version: 4.0.12-1
Severity: serious
Justification: security

See attached advisory.

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)
[Message part 2 (message/rfc822, inline)]
From: Thomas Sibley <trs@bestpractical.com>
To: rt-announce@lists.bestpractical.com
Subject: [rt-announce] Security vulnerabilities in RT
Date: Wed, 22 May 2013 11:06:22 -0700
[Message part 3 (text/plain, inline)]
We discovered a number of security vulnerabilities which affect both RT
3.8.x and RT 4.0.x.  We are releasing RT versions 3.8.17 and 4.0.13 to
resolve these vulnerabilities, as well as patches which apply atop all
released versions of 3.8 and 4.0.


The vulnerabilities addressed by 3.8.17, 4.0.13, and the below patches
include the following:


RT 4.0.0 and above are vulnerable to a limited privilege escalation
leading to unauthorized modification of ticket data.  The DeleteTicket
right and any custom lifecycle transition rights may be bypassed by any
user with ModifyTicket.  This vulnerability is assigned CVE-2012-4733.

RT 3.8.0 and above include a version of bin/rt that uses
semi-predictable names when creating tempfiles.  This could possibly be
exploited by a malicious user to overwrite files with permissions of the
user running bin/rt.  This vulnerability is assigned CVE-2013-3368.

RT 3.8.0 and above allow calling of arbitrary Mason components (without
control of arguments) for users who can see administration pages.  This
could be used by a malicious user to run private components which may
have negative side-effects.  This vulnerability is assigned
CVE-2013-3369.

RT 3.8.0 and above allow direct requests to private callback components.
Though no callback components ship with RT, this could be used to
exploit an extension or local callback which uses the arguments passed
to it insecurely.  This vulnerability is assigned CVE-2013-3370.

RT 3.8.3 and above are vulnerable to cross-site scripting (XSS) via
attachment filenames.  The vector is difficult to exploit due to parsing
requirements.  Additionally, RT 4.0.0 and above are vulnerable to XSS
via maliciously-crafted "URLs" in ticket content when RT's "MakeClicky"
feature is configured.  Although not believed to be exploitable in the
stock configuration, a patch is also included for RTIR 2.6.x to add
bulletproofing.  These vulnerabilities are assigned CVE-2013-3371.

RT 3.8.0 and above are vulnerable to an HTTP header injection limited to
the value of the Content-Disposition header.  Injection of other
arbitrary response headers is not possible.  Some (especially older)
browsers may allow multiple Content-Disposition values which could lead
to XSS.  Newer browsers contain security measures to prevent this.
Thank you to Dominic Hargreaves for reporting this vulnerability.  This
vulnerability is assigned CVE-2013-3372.

RT 3.8.0 and above are vulnerable to a MIME header injection in outgoing
email generated by RT.  The vectors via RT's stock templates are
resolved by this patchset, but any custom email templates should be
updated to ensure that values interpolated into mail headers do not
contain newlines.  This vulnerability is assigned CVE-2013-3373.

RT 3.8.0 and above are vulnerable to limited session re-use when using
the file-based session store, Apache::Session::File.  RT's default
session configuration only uses Apache::Session::File for Oracle.  RT
instances using Oracle may be locally configured to use the
database-backed Apache::Session::Oracle, in which case sessions are
never re-used.  The extent of session re-use is limited to information
leaks of certain user preferences and caches, such as queue names
available for ticket creation.  Thank you to Jenny Martin for reporting
the problem that lead to discovery of this vulnerability.  This
vulnerability is assigned CVE-2013-3374.


Patches for all releases of 3.8.x and 4.0.x are available for download
below.  Versions of RT older than 3.8.0 are unsupported and do not
receive security patches; please contact sales@bestpractical.com if you
need assistance with an older RT version.

http://download.bestpractical.com/pub/rt/release/security-2013-05-22.tar.gz
http://download.bestpractical.com/pub/rt/release/security-2013-05-22.tar.gz.sig

25349c393c1b8d720f26a62dd57dc90d7def1cea  security-2013-05-22.tar.gz
d78db2e9fba3b78c1ee7a0a8d9ede871cc7ba7dc  security-2013-05-22.tar.gz.sig

The README in the tarball contains instructions for applying the
patches.  If you need help resolving this issue locally, we will provide
discounted pricing for single-incident support; please contact us at
sales@bestpractical.com for more information.

[signature.asc (application/pgp-signature, attachment)]
[Message part 5 (text/plain, inline)]
_______________________________________________
rt-announce mailing list
rt-announce@lists.bestpractical.com
http://lists.bestpractical.com/cgi-bin/mailman/listinfo/rt-announce

Reply sent to Dominic Hargreaves <dom@earth.li>:
You have taken responsibility. (Sat, 25 May 2013 21:15:05 GMT) (full text, mbox, link).


Notification sent to Dominic Hargreaves <dom@earth.li>:
Bug acknowledged by developer. (Sat, 25 May 2013 21:15:06 GMT) (full text, mbox, link).


Message #10 received at 709836-done@bugs.debian.org (full text, mbox, reply):

From: Dominic Hargreaves <dom@earth.li>
To: 709836-done@bugs.debian.org
Subject: Fixed
Date: Sat, 25 May 2013 22:11:21 +0100
Version: 4.0.12-2

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)



Marked as fixed in versions request-tracker4/4.0.7-5+deb7u2. Request was from Dominic Hargreaves <dom@earth.li> to control@bugs.debian.org. (Sat, 25 May 2013 21:18:11 GMT) (full text, mbox, link).


Marked as found in versions request-tracker4/4.0.7-5. Request was from Dominic Hargreaves <dom@earth.li> to control@bugs.debian.org. (Sat, 25 May 2013 21:21:04 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Wed, 03 Jul 2013 07:31:22 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:47:05 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.