Package: twiki Version: 1:4.0.5-7 I expect to look into this on the weekend
Sven On Thu, 2007-02-08 at 09:31 -0800, Peter Thoeny wrote: > This is a security advisory for TWiki installations: > > Local users may cause TWiki to execute arbitrary code > by creating CGI session files. > > * Vulnerable Software Version > * Attack Vectors > * Impact > * Severity Level > * MITRE Name for this Vulnerability > * Details > * Countermeasures > * Hotfix for TWiki 4.x > * Hotfix for older TWikis using SessionPlugin > * Authors and Credits > * Action Plan with Timeline > * Feedback > * External Links > > > ---++ Vulnerable Software Version > > * TWikiRelease04x01x00 -- TWiki-4.1.0.zip > * TWikiRelease04x00x05 -- TWiki-4.0.5.zip > * TWikiRelease04x00x04 -- TWiki-4.0.4.zip > * TWikiRelease04x00x03 -- TWiki-4.0.3.zip > * TWikiRelease04x00x02 -- TWiki-4.0.2.zip > * TWikiRelease04x00x01 -- TWiki-4.0.1.zip > * TWikiRelease04x00x00 -- TWiki-4.0.0.zip > * Any previous TWiki version using SessionPlugin [6] > > > ---++ Attack Vectors > > Write access to global /tmp directory (or CGI session > directory, if different). This can be either directly > on file level (such as on a shared host), or via an > HTTP vulnerability of a third party web application. > > > ---++ Impact > > Under the assumption that an intruder has write access > to the /tmp directory (or CGI session directory), such > as with a vulnerability of another web application > running on the same server, it is possible to execute > arbitrary Perl code with the privileges of the web > server process, such as user "nobody". > > > ---++ Severity Level > > The TWiki SecurityTeam [2] triaged this issue as > documented in TWikiSecurityAlertProcess [3] and > assigned the following severity level: > > * Severity 2 issue: The TWiki installation is > compromised > > > ---++ MITRE Name for this Vulnerability > > The Common Vulnerabilities and Exposures project has > assigned the name CVE-2007-0669 [4] to this > vulnerability. > > > ---++ Details > > Your site may be vulnerable if: > > 1. You run one of the vulnerable TWiki versions, and > 2. You have *not* reconfigured the CGI session > directory $cfg{Sessions}{Dir} to a private > directory > > In particular, disabling the CGI session tracking via > $cfg{UseClientSessions} is *not* sufficient to protect > against this vulnerability, since there is session > cleanup code that runs regardless of whether sessions > are enabled or not. > > > ---++ Countermeasures > > * Restrict access to the TWiki server on file level > and HTTP. > * If on a shared host, move TWiki to a dedicated > host. > * Upgrade to TWiki Release 4.1.1 [5] (recommended) > * Apply a hotfix indicated below. > > NOTE: The hotfix is known to prevent the current > attacks, but it might not be a complete fix. > > > ---++ Hotfix for TWiki 4.x > > In configure, change $cfg{Sessions}{Dir} to a private > directory (one which is only readable and writable by > the user your web server is running as, and is not > served as web content to remote users). The recommended > fix is to make a $cfg{DataDir}/session_tmp directory > owned by the user Apache is running as, change its > permissions to 0700 (drwx------), and set > $cfg{Sessions}{Dir} to that directory. > > Upgrading to TWiki 4.1.1 is recommended; the session > files are cleaned up by timestamp, i.e. no longer > executed. TWiki 4.1.1 will create and use the > /tmp/twiki directory by default to store the session > files. > > > ---++ Hotfix for older TWikis using SessionPlugin > > This section details the attack vectors, details, and > countermeasures for this vulnerability as it applies > to the SessionPlugin [6]. This section does not apply > to TWiki versions 4.0 and up, which use built-in > session tracking. > > Vulnerable software version > > * Plugins.SessionPlugin 1.0 -- SessionPlugin.zip > (attachment versions 1-5) > * Plugins.SessionPlugin 2.0-2.992 -- > SessionPlugin.zip (attachment versions 6-8) > > Attack Vectors > > * For SessionPlugin 1.000: > * Write access to the $cfg{DataDir}/.session > directory, which in some cases may be created > world-writable for local users. > * For SessionPlugin 2.0-2.992: > * Write access to global /tmp directory. This > can be either directly on file level (such as > shared host), or HTTP vulnerability of a third > party web application. > > Countermeasures > > * For SessionPlugin 1.000 (attachment versions 1-5 > from the SessionPlugin topic): > * Ensure that the $cfg{DataDir}/.session directory > exists, is owned by the user Apache is running > as, and has 0700 permissions (drwx------). > * For SessionPlugin 2.9 (attachment versions 6-8 from > the SessionPlugin topic): > * Upgrade to Plugins.SessionPlugin 2.992 > (attachment version 9 from the SessionPlugin > topic). > > > ---++ Authors and Credits > > * Credit to Andrew Moise for disclosing the issue to > the twiki-security mailing list > * Kenneth Lavrsen and Andrew Moise for creating the > hotfix > * Andrew Moise and Peter Thoeny for creating the > advisory > > > ---++ Action Plan with Timeline > > * 2007-01-28: User discloses vulnerability to > twiki-security > * 2007-01-29: Developer verifies issue > * 2007-01-31: Developer fixes code and creates > hotfix > * 2007-02-05: Security team creates advisory > * 2007-02-06: Send alert to > TWiki-Announce mailing list and TWiki-Dev mailing list > * 2007-02-08: Publish advisory in Codev web and > update all related topics > * 2007-02-08: Issue a public security advisory > > > ---++ Feedback > > Please provide feedback at the security alert topic [1], > http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2007-0669 > > > ---++ External Links > > [1]: http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2007-0669 > [2]: http://twiki.org/cgi-bin/view/Codev/SecurityTeam > [3]: http://twiki.org/cgi-bin/view/Codev/TWikiSecurityAlertProcess > [4]: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0669 > [5]: http://twiki.org/cgi-bin/view/Codev/DownloadTWiki > [6]: http://twiki.org/cgi-bin/view/Plugins/SessionPlugin > > -- Contributors: Andrew Moise, Kenneth Lavrsen, Peter > Thoeny - 08 Feb 2007 > > -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]