cakephp: XML class SSRF vulnerability

Related Vulnerabilities: CVE-2015-8379  

Debian Bug report logs - #832283
cakephp: XML class SSRF vulnerability

version graph

Reported by: balint@balintreczey.hu

Date: Sat, 23 Jul 2016 18:57:02 UTC

Severity: serious

Tags: fixed-upstream, security, upstream

Found in version cakephp/1.3.2-1

Fixed in versions cakephp/1.3.15-1+deb7u1, 2.6.7-1, cakephp/1.3.2-1.1+deb6u11

Done: Dmitry Smirnov <onlyjob@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Dmitry Smirnov <onlyjob@debian.org>:
Bug#832283; Package src:cakephp. (Sat, 23 Jul 2016 18:57:06 GMT) (full text, mbox, link).


Acknowledgement sent to balint@balintreczey.hu:
New Bug report received and forwarded. Copy sent to Dmitry Smirnov <onlyjob@debian.org>. (Sat, 23 Jul 2016 18:57:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Bálint Réczey <balint@balintreczey.hu>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: cakephp: Affected by multiple security issues
Date: Sat, 23 Jul 2016 20:55:39 +0200
Source: cakephp
Version: 2.8.3-1
Severity: serious

Dear Maintainers,

CakePHP is affected by the following security issues listed at
https://security-tracker.debian.org/tracker/source-package/cakephp:

TEMP-0000000-698CF7: cakephp: XML class SSRF vulnerability
CVE-2015-8379: CakePHP 2.x and 3.x before 3.1.5 might allow remote
attackers to bypass the CSRF protection mechanism via the _method
parameter.

The former has been addressed by upstream in the 3.0.6 release:
https://github.com/cakephp/cakephp/releases/tag/3.0.6

The latter has been partially fixed in the 3.1.5 then in the 3.2.0 releases:
https://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html
https://github.com/cakephp/cakephp/pull/7938

Cheers,
Balint



Added tag(s) security, fixed-upstream, and upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 24 Jul 2016 05:51:08 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Dmitry Smirnov <onlyjob@debian.org>:
Bug#832283; Package src:cakephp. (Sun, 24 Jul 2016 05:57:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Dmitry Smirnov <onlyjob@debian.org>. (Sun, 24 Jul 2016 05:57:04 GMT) (full text, mbox, link).


Message #12 received at 832283@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: balint@balintreczey.hu, 832283@bugs.debian.org
Subject: Re: Bug#832283: cakephp: Affected by multiple security issues
Date: Sun, 24 Jul 2016 07:54:47 +0200
Hi Balint,

On Sat, Jul 23, 2016 at 08:55:39PM +0200, Bálint Réczey wrote:
> TEMP-0000000-698CF7: cakephp: XML class SSRF vulnerability
> CVE-2015-8379: CakePHP 2.x and 3.x before 3.1.5 might allow remote
> attackers to bypass the CSRF protection mechanism via the _method
> parameter.

Since one of the issues has (and probably will never get a CVE id), I
have cloned this bugreport to identify the two issues separatly via
the security-tracker and the bug number.

Btw, please never use TEMP-.* as identifier, it is not meant to be
stable. You will see that the above is not anymore valid.

Regards,
Salvatore



Bug 832283 cloned as bug 832316 Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 24 Jul 2016 05:57:06 GMT) (full text, mbox, link).


Changed Bug title to 'cakephp: XML class SSRF vulnerability' from 'cakephp: Affected by multiple security issues'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 24 Jul 2016 05:57:07 GMT) (full text, mbox, link).


Marked as found in versions cakephp/1.3.2-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 24 Jul 2016 05:57:08 GMT) (full text, mbox, link).


Marked as fixed in versions cakephp/1.3.2-1.1+deb6u11. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 24 Jul 2016 05:57:09 GMT) (full text, mbox, link).


Reply sent to Dmitry Smirnov <onlyjob@debian.org>:
You have taken responsibility. (Sun, 24 Jul 2016 08:27:16 GMT) (full text, mbox, link).


Notification sent to balint@balintreczey.hu:
Bug acknowledged by developer. (Sun, 24 Jul 2016 08:27:16 GMT) (full text, mbox, link).


Message #25 received at 832283-done@bugs.debian.org (full text, mbox, reply):

From: Dmitry Smirnov <onlyjob@debian.org>
To: 832283-done@bugs.debian.org
Subject: Done: cakephp: XML class SSRF vulnerability
Date: Sun, 24 Jul 2016 18:24:33 +1000
[Message part 1 (text/plain, inline)]
Source: cakephp
Version: 2.6.7-1

As far as I understand upstream fixed this problem in 2.6.6:

    https://github.com/cakephp/cakephp/releases/tag/2.6.6

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 832283@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

-- 
Cheers,
 Dmitry Smirnov
 GPG key : 4096R/52B6BBD953968D1B

---

Good luck happens when preparedness meets opportunity.
[signature.asc (application/pgp-signature, inline)]

No longer marked as found in versions cakephp/2.8.3-1. Request was from Bálint Réczey <balint@balintreczey.hu> to control@bugs.debian.org. (Sun, 24 Jul 2016 08:39:03 GMT) (full text, mbox, link).


Marked as fixed in versions cakephp/1.3.15-1+deb7u1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Fri, 29 Jul 2016 06:18:04 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 05 Dec 2016 11:13:29 GMT) (full text, mbox, link).


Bug unarchived. Request was from Don Armstrong <don@debian.org> to control@bugs.debian.org. (Wed, 07 Dec 2016 01:51:48 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 16 Jul 2017 07:53:06 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 14:23:43 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.