Lines 169163-169168
Link Here
|
169163 |
<entry>2005-09-29</entry> |
169163 |
<entry>2005-09-29</entry> |
169164 |
</dates> |
169164 |
</dates> |
169165 |
</vuln> |
169165 |
</vuln> |
|
|
169166 |
|
169167 |
<vuln vid="9908a1cc-35ad-424d-be0b-7e56abd5931a"> |
169168 |
<topic>sympa -- Denial of service caused by malformed CSRF token</topic> |
169169 |
<affects> |
169170 |
<package> |
169171 |
<name>sympa</name> |
169172 |
<range><lt>6.2.54</lt></range> |
169173 |
</package> |
169174 |
</affects> |
169175 |
<description> |
169176 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
169177 |
<p>Javier Moreno discovered a vulnerability in Sympa web interface that can cause |
169178 |
denial of service (DoS) attack.</p> |
169179 |
<p>By submitting requests with malformed parameters, this flaw allows to create |
169180 |
junk files in Sympa’s directory for temporary files. And particularly by |
169181 |
tampering token to prevent CSRF, it allows to originate exessive notification |
169182 |
messages to listmasters.</p> |
169183 |
</body> |
169184 |
</description> |
169185 |
<references> |
169186 |
<cvename>CVE-2020-9369</cvename> |
169187 |
<url>https://sympa-community.github.io/security/2020-001.html</url> |
169188 |
</references> |
169189 |
<dates> |
169190 |
<discovery>2020-02-24</discovery> |
169191 |
<entry>2020-05-22</entry> |
169192 |
</dates> |
169193 |
</vuln> |
169194 |
|
169195 |
<vuln vid="61bc44ce-9f5a-11ea-aff3-f8b156c2bfe9"> |
169196 |
<topic>sympa - Security flaws in setuid wrappers</topic> |
169197 |
<affects> |
169198 |
<package> |
169199 |
<name>sympa</name> |
169200 |
<range><lt>6.2.56</lt></range> |
169201 |
</package> |
169202 |
</affects> |
169203 |
<description> |
169204 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
169205 |
<p>A vulnerability has been discovered in Sympa web interface by which attacker can |
169206 |
execute arbitrary code with root privileges.</p> |
169207 |
<p>Sympa uses two sorts of setuid wrappers: |
169208 |
<ul><li>FastCGI wrappers</li> |
169209 |
<li>newaliases wrapper</li></ul></p> |
169210 |
<p>The FastCGI wrappers (wwsympa-wrapper.fcgi and sympa_soap_server-wrapper.fcgi) |
169211 |
were used to make the web interface running under privileges of a |
169212 |
dedicated user.</p> |
169213 |
<p>The newaliases wrapper (sympa_newaliases-wrapper) allows Sympa to update the |
169214 |
alias database with root privileges.</p> |
169215 |
<p>Since these setuid wrappers did not clear environment variables, |
169216 |
if environment variables like PERL5LIB were injected, |
169217 |
forged code might be loaded and executed under privileges of setuid-ed |
169218 |
users.</p> |
169219 |
</body> |
169220 |
</description> |
169221 |
<references> |
169222 |
<url>https://sympa-community.github.io/security/2020-002.html</url> |
169223 |
</references> |
169224 |
<dates> |
169225 |
<discovery>2020-05-24</discovery> |
169226 |
<entry>2020-05-26</entry> |
169227 |
</dates> |
169228 |
</vuln> |
169229 |
|
169166 |
</vuxml><!-- EOF --> |
169230 |
</vuxml><!-- EOF --> |
169167 |
<!-- Note: Please add new entries to the beginning of this file. --> |
169231 |
<!-- Note: Please add new entries to the beginning of this file. --> |
169168 |
<!-- ex: set ts=8 tw=80 sw=2: --> |
169232 |
<!-- ex: set ts=8 tw=80 sw=2: --> |