Bundled plugins using Xinha allow malicious file uploads

Related Vulnerabilities: CVE-2011-1133   CVE-2011-1134   CVE-2011-1135  

Debian Bug report logs - #611661
Bundled plugins using Xinha allow malicious file uploads

version graph

Package: serendipity; Maintainer for serendipity is (unknown);

Reported by: "Daniel E. Markle" <dmarkle@ashtech.net>

Date: Mon, 31 Jan 2011 18:45:01 UTC

Severity: grave

Tags: security

Found in version serendipity/1.5.3-2

Fixed in version 1.5.3-2+rm

Done: Debian FTP Masters <ftpmaster@ftp-master.debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Jean-Marc Roth <jmroth@iip.lu>:
Bug#611661; Package serendipity. (Mon, 31 Jan 2011 18:45:04 GMT) (full text, mbox, link).


Acknowledgement sent to "Daniel E. Markle" <dmarkle@ashtech.net>:
New Bug report received and forwarded. Copy sent to Jean-Marc Roth <jmroth@iip.lu>. (Mon, 31 Jan 2011 18:45:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: "Daniel E. Markle" <dmarkle@ashtech.net>
To: submit@bugs.debian.org
Subject: Bundled plugins using Xinha allow malicious file uploads
Date: Mon, 31 Jan 2011 13:32:01 -0500
Package: serendipity
Version: 1.5.3-2

Summary of the problem from upstream:

"Xinha ships with several plugins that utilize PHP scripting for special usage, like the ImageManager or ExtendedFileManager. A 0-day security exploit has been reported available as of today that exploits the functionality of these plugins to upload malicious files to your webspace, to execute foreign code."

Full details (and recommended fixes) at:
http://blog.s9y.org/archives/224-Important-Security-Update-Serendipity-1.5.5-released.html





Added tag(s) security. Request was from Alex Brotman <atbrotman@yahoo.com> to control@bugs.debian.org. (Tue, 01 Feb 2011 18:27:09 GMT) (full text, mbox, link).


Severity set to 'grave' from 'normal' Request was from Moritz Muehlenhoff <jmm@debian.org> to control@bugs.debian.org. (Wed, 16 Feb 2011 20:12:26 GMT) (full text, mbox, link).


Added tag(s) pending. Request was from jm@roth.lu to control@bugs.debian.org. (Wed, 16 Feb 2011 22:39:05 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Jean-Marc Roth <jmroth@iip.lu>:
Bug#611661; Package serendipity. (Tue, 08 Mar 2011 13:18:16 GMT) (full text, mbox, link).


Acknowledgement sent to Hector Romojaro <hromojaro@dia.uned.es>, 611661@bugs.debian.org:
Extra info received and forwarded to list. Copy sent to Jean-Marc Roth <jmroth@iip.lu>. (Tue, 08 Mar 2011 13:18:17 GMT) (full text, mbox, link).


Message #16 received at 611661@bugs.debian.org (full text, mbox, reply):

From: Hector Romojaro <hromojaro@dia.uned.es>
To: 611661@bugs.debian.org
Cc: Francesco Paolo Lovergine <frankie@debian.org>, security@debian.org
Subject: Bug#611661: Bundled plugins using Xinha allow malicious file uploads
Date: Tue, 08 Mar 2011 14:02:31 +0100
Hi,

About openacs and dotlrn packages, I don't think they are affected by
any of the Xinha vulnerabilities [1][2][3]. The summary says:

"Xinha ships with several plugins that utilize PHP scripting for special
usage, like the ImageManager or ExtendedFileManager. A 0-day security
exploit has been reported available as of today that exploits the
functionality of these plugins to upload malicious files to your
webspace, to execute foreign code." [4]

It seems a PHP problem, and the proposed fix is just to remove a bunch
of php files, so I guess the packages are safe because they don't use
PHP at all, as well as the aolserver package. There is no way to execute
that PHP code on openacs or dotlrn.

[1] http://security-tracker.debian.org/tracker/CVE-2011-1133
[2] http://security-tracker.debian.org/tracker/CVE-2011-1134
[3] http://security-tracker.debian.org/tracker/CVE-2011-1135
[4]
http://blog.s9y.org/archives/224-Important-Security-Update-Serendipity-1.5.5-released.html

Cheers, Héctor





Information forwarded to debian-bugs-dist@lists.debian.org, Jean-Marc Roth <jmroth@iip.lu>:
Bug#611661; Package serendipity. (Tue, 08 Mar 2011 21:39:08 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Jean-Marc Roth <jmroth@iip.lu>. (Tue, 08 Mar 2011 21:39:08 GMT) (full text, mbox, link).


Message #21 received at 611661@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <jmm@inutil.org>
To: Hector Romojaro <hromojaro@dia.uned.es>, 611661@bugs.debian.org
Cc: Francesco Paolo Lovergine <frankie@debian.org>, security@debian.org
Subject: Re: Bug#611661: Bundled plugins using Xinha allow malicious file uploads
Date: Tue, 8 Mar 2011 22:37:13 +0100
On Tue, Mar 08, 2011 at 02:02:31PM +0100, Hector Romojaro wrote:
> Hi,
> 
> About openacs and dotlrn packages, I don't think they are affected by
> any of the Xinha vulnerabilities [1][2][3]. The summary says:
> 
> "Xinha ships with several plugins that utilize PHP scripting for special
> usage, like the ImageManager or ExtendedFileManager. A 0-day security
> exploit has been reported available as of today that exploits the
> functionality of these plugins to upload malicious files to your
> webspace, to execute foreign code." [4]
> 
> It seems a PHP problem, and the proposed fix is just to remove a bunch
> of php files, so I guess the packages are safe because they don't use
> PHP at all, as well as the aolserver package. There is no way to execute
> that PHP code on openacs or dotlrn.
> 
> [1] http://security-tracker.debian.org/tracker/CVE-2011-1133
> [2] http://security-tracker.debian.org/tracker/CVE-2011-1134
> [3] http://security-tracker.debian.org/tracker/CVE-2011-1135
> [4]
> http://blog.s9y.org/archives/224-Important-Security-Update-Serendipity-1.5.5-released.html

Thanks, I've updated the security tracker.

Cheers,
        Moritz




Information forwarded to debian-bugs-dist@lists.debian.org, Jean-Marc Roth <jmroth@iip.lu>:
Bug#611661; Package serendipity. (Sun, 13 May 2012 17:06:03 GMT) (full text, mbox, link).


Acknowledgement sent to Steve McIntyre <steve@einval.com>:
Extra info received and forwarded to list. Copy sent to Jean-Marc Roth <jmroth@iip.lu>. (Sun, 13 May 2012 17:06:03 GMT) (full text, mbox, link).


Message #26 received at 611661@bugs.debian.org (full text, mbox, reply):

From: Steve McIntyre <steve@einval.com>
To: Moritz Muehlenhoff <jmm@inutil.org>, 611661@bugs.debian.org
Cc: Hector Romojaro <hromojaro@dia.uned.es>, Francesco Paolo Lovergine <frankie@debian.org>, security@debian.org
Subject: Re: Bug#611661: Bundled plugins using Xinha allow malicious file uploads
Date: Sun, 13 May 2012 18:04:03 +0100
On Tue, Mar 08, 2011 at 10:37:13PM +0100, Moritz Muehlenhoff wrote:
>On Tue, Mar 08, 2011 at 02:02:31PM +0100, Hector Romojaro wrote:
>> Hi,
>> 
>> About openacs and dotlrn packages, I don't think they are affected by
>> any of the Xinha vulnerabilities [1][2][3]. The summary says:
>> 
>> "Xinha ships with several plugins that utilize PHP scripting for special
>> usage, like the ImageManager or ExtendedFileManager. A 0-day security
>> exploit has been reported available as of today that exploits the
>> functionality of these plugins to upload malicious files to your
>> webspace, to execute foreign code." [4]
>> 
>> It seems a PHP problem, and the proposed fix is just to remove a bunch
>> of php files, so I guess the packages are safe because they don't use
>> PHP at all, as well as the aolserver package. There is no way to execute
>> that PHP code on openacs or dotlrn.
>> 
>> [1] http://security-tracker.debian.org/tracker/CVE-2011-1133
>> [2] http://security-tracker.debian.org/tracker/CVE-2011-1134
>> [3] http://security-tracker.debian.org/tracker/CVE-2011-1135
>> [4]
>> http://blog.s9y.org/archives/224-Important-Security-Update-Serendipity-1.5.5-released.html
>
>Thanks, I've updated the security tracker.

So... does this bug still need to be grave?

Looking at other bugs and security tracker issues in serendipity, I'd
be tempted to remove it from Debian anyway...

-- 
Steve McIntyre, Cambridge, UK.                                steve@einval.com
  Armed with "Valor": "Centurion" represents quality of Discipline,
  Honor, Integrity and Loyalty. Now you don't have to be a Caesar to
  concord the digital world while feeling safe and proud.





Information forwarded to debian-bugs-dist@lists.debian.org, Jean-Marc Roth <jmroth@iip.lu>:
Bug#611661; Package serendipity. (Sun, 13 May 2012 19:27:04 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Mühlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Jean-Marc Roth <jmroth@iip.lu>. (Sun, 13 May 2012 19:27:04 GMT) (full text, mbox, link).


Message #31 received at 611661@bugs.debian.org (full text, mbox, reply):

From: Moritz Mühlenhoff <jmm@inutil.org>
To: Steve McIntyre <steve@einval.com>, thijs@debian.org
Cc: Moritz Muehlenhoff <jmm@inutil.org>, 611661@bugs.debian.org, Hector Romojaro <hromojaro@dia.uned.es>, Francesco Paolo Lovergine <frankie@debian.org>, security@debian.org
Subject: Re: Bug#611661: Bundled plugins using Xinha allow malicious file uploads
Date: Sun, 13 May 2012 21:25:07 +0200
On Sun, May 13, 2012 at 06:04:03PM +0100, Steve McIntyre wrote:
> On Tue, Mar 08, 2011 at 10:37:13PM +0100, Moritz Muehlenhoff wrote:
> >On Tue, Mar 08, 2011 at 02:02:31PM +0100, Hector Romojaro wrote:
> >> Hi,
> >> 
> >> About openacs and dotlrn packages, I don't think they are affected by
> >> any of the Xinha vulnerabilities [1][2][3]. The summary says:
> >> 
> >> "Xinha ships with several plugins that utilize PHP scripting for special
> >> usage, like the ImageManager or ExtendedFileManager. A 0-day security
> >> exploit has been reported available as of today that exploits the
> >> functionality of these plugins to upload malicious files to your
> >> webspace, to execute foreign code." [4]
> >> 
> >> It seems a PHP problem, and the proposed fix is just to remove a bunch
> >> of php files, so I guess the packages are safe because they don't use
> >> PHP at all, as well as the aolserver package. There is no way to execute
> >> that PHP code on openacs or dotlrn.
> >> 
> >> [1] http://security-tracker.debian.org/tracker/CVE-2011-1133
> >> [2] http://security-tracker.debian.org/tracker/CVE-2011-1134
> >> [3] http://security-tracker.debian.org/tracker/CVE-2011-1135
> >> [4]
> >> http://blog.s9y.org/archives/224-Important-Security-Update-Serendipity-1.5.5-released.html
> >
> >Thanks, I've updated the security tracker.
> 
> So... does this bug still need to be grave?
> 
> Looking at other bugs and security tracker issues in serendipity, I'd
> be tempted to remove it from Debian anyway...

I suggested the same some time ago and Thijs (added to CC) said that
removing it from testing would be the first step (which we did back
then).

Thijs, what's your take on dropping s9y for Wheezy?

Cheers,
        Moritz







Information forwarded to debian-bugs-dist@lists.debian.org, Jean-Marc Roth <jmroth@iip.lu>:
Bug#611661; Package serendipity. (Sun, 13 May 2012 19:48:42 GMT) (full text, mbox, link).


Acknowledgement sent to "J.M.Roth" <jmroth@iip.lu>:
Extra info received and forwarded to list. Copy sent to Jean-Marc Roth <jmroth@iip.lu>. (Sun, 13 May 2012 19:49:00 GMT) (full text, mbox, link).


Message #36 received at 611661@bugs.debian.org (full text, mbox, reply):

From: "J.M.Roth" <jmroth@iip.lu>
To: Moritz Mühlenhoff <jmm@inutil.org>, 611661@bugs.debian.org
Cc: Steve McIntyre <steve@einval.com>, thijs@debian.org, Hector Romojaro <hromojaro@dia.uned.es>, Francesco Paolo Lovergine <frankie@debian.org>, security@debian.org
Subject: Re: Bug#611661: Bundled plugins using Xinha allow malicious file uploads
Date: Sun, 13 May 2012 21:32:44 +0200
On 13-May-12 21:25, Moritz Mühlenhoff wrote:
> On Sun, May 13, 2012 at 06:04:03PM +0100, Steve McIntyre wrote:
>> On Tue, Mar 08, 2011 at 10:37:13PM +0100, Moritz Muehlenhoff wrote:
>> Looking at other bugs and security tracker issues in serendipity, I'd
>> be tempted to remove it from Debian anyway... 
> I suggested the same some time ago and Thijs (added to CC) said that
> removing it from testing would be the first step (which we did back
> then).
>
> Thijs, what's your take on dropping s9y for Wheezy?
>
> Cheers,
>         Moritz
>
Hi,
#611661 has been pending upload for a while.
Yeah, maybe I should've pinged Thijs sooner.
I am committing a fix for #650937 now.
I'm currently trying to find out what to do to fix the latest one.
BFN




Reply sent to Debian FTP Masters <ftpmaster@ftp-master.debian.org>:
You have taken responsibility. (Fri, 17 May 2013 11:48:34 GMT) (full text, mbox, link).


Notification sent to "Daniel E. Markle" <dmarkle@ashtech.net>:
Bug acknowledged by developer. (Fri, 17 May 2013 11:48:34 GMT) (full text, mbox, link).


Message #41 received at 611661-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 499765-done@bugs.debian.org,541740-done@bugs.debian.org,611661-done@bugs.debian.org,646538-done@bugs.debian.org,650937-done@bugs.debian.org,671937-done@bugs.debian.org,672331-done@bugs.debian.org,673971-done@bugs.debian.org,702765-done@bugs.debian.org,
Cc: serendipity@packages.debian.org, serendipity@packages.qa.debian.org
Subject: Bug#707980: Removed package(s) from unstable
Date: Fri, 17 May 2013 11:47:22 +0000
Version: 1.5.3-2+rm

Dear submitter,

as the package serendipity has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see http://bugs.debian.org/707980

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@debian.org.

Debian distribution maintenance software
pp.
Luca Falavigna (the ftpmaster behind the curtain)



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 15 Jun 2013 07:45:05 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 14:52:10 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.