[opencms-dev] OpenCms security advisory?
Alexander Kandzior
alex at opencms.org
Fri Jul 28 13:47:29 CEST 2006
> thanks for sharing this. Indeed it's strange that the release notes do
> not contain at least a reference to that advisory.
But they do:
* Fixed issue #1190: Multiple access control and input validation
vulnerabilities
Bug #1190 is exactly the vulnerability report mentioned, please see
http://www.opencms.org/bugzilla/show_bug.cgi?id=1190.
Kind Regards,
Alex.
-------------------
Alexander Kandzior
Alkacon Software GmbH - The OpenCms Experts
http://www.alkacon.com - http://www.opencms.org
> -----Original Message-----
> From: opencms-dev-bounces at opencms.org
> [mailto:opencms-dev-bounces at opencms.org] On Behalf Of
> Christian Steinert
> Sent: Friday, July 28, 2006 1:08 PM
> To: The OpenCms mailing list
> Subject: Re: [opencms-dev] OpenCms security advisory?
>
> Bastian Ballmann schrieb:
> > Hello,
> >
> > I cannot find a note about this advisory on the mailinglist, so I'll
> > send it to you.
> >
> > "OpenCms versions 6.2.1, 6.2, 6.0.3, 6.0.4 (possibly older
> versions too) are
> > vulnerable to multiple access control and input validation
> vulnerabilities,
> > which allow authenticated users to perform the following
> unauthrozied
> > actions:
> >
> > * View and download application's log file;
> > * Download arbitrary files from the system;
> > * View sources of JSP files (provided they are locked by
> some other user);
> > * Add webusers;
> > * Upload new OpenCms modules;
> > * Overwrite existing OpenCms modules;
> > * Upload database import/export files;
> > * Overwrite existing database import/export files;
> > * Send broadcast messages to all users;
> > * Send JavaScript to any user (XSS);
> > * Obtain list of all users and groups"
> >
> >
> http://packetstormsecurity.org/0607-exploits/OpenCMS_multiple_
> vulnerabilities.txt
> >
> > That issues were fixed by Alkacon in release 6.2.2, but
> unfortunately I
> > cannot find any advice that it's important to upgrade to 6.2.2.
> >
> > The release note from Alkacon only told "No important new
> features have
> > been added since the 6.2.1 version.".
> >
> > Regards
> >
> > Bastian Ballmann
> > --
>
> Dear Basian,
>
> thanks for sharing this. Indeed it's strange that the release notes do
> not contain at least a reference to that advisory.
>
> The risk is reduced significantly by the fact that a workplace user is
> required to exploit these vulnerabilities:
> "Most of the access control vulnerabilities mentioned above can be
> exploited by accessing the URL that provides the functionality, while
> logged in as unprivileged user(member of Users group)."
>
> But still it would be more than warranted to announce the existence of
> these vulnerabilities and advise people to upgrade.
>
> Especially because the errors where addressed by releasing a
> new version
> in only slightly more than a week, being open about this issue could
> have lead to a feeling of *more* confidence. Like this it
> feels more as
> if it's being covered up.
>
> Christian
>
>
>
More information about the opencms-dev
mailing list