Bug 13196 - cups new web interface XSS security issue fixed in 1.7.2 (CVE-2014-2856)
Summary: cups new web interface XSS security issue fixed in 1.7.2 (CVE-2014-2856)
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/596237/
Whiteboard: MGA3TOO has_procedure advisory mga3-3...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2014-04-11 15:56 CEST by David Walser
Modified: 2014-04-25 19:01 CEST (History)
2 users (show)

See Also:
Source RPM: cups-1.7.1-2.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2014-04-11 15:56:22 CEST
CUPS 1.7.2 has been released:
http://www.cups.org/blog.php?L717

It fixes a security issue in the web interface:
http://www.cups.org/str.php?L4356

The patch is here:
http://www.cups.org/strfiles.php/3268/str4356.patch

I don't know if a CVE will be allocated for this.

Mageia 3 and Mageia 4 are also affected.

Reproducible: 

Steps to Reproduce:
David Walser 2014-04-11 15:56:30 CEST

Whiteboard: (none) => MGA4TOO, MGA3TOO

Comment 1 David Walser 2014-04-14 14:00:02 CEST
CVE request:
http://openwall.com/lists/oss-security/2014/04/14/2
Comment 2 David Walser 2014-04-15 19:07:33 CEST
CVE-2014-2856 has been assigned:
http://openwall.com/lists/oss-security/2014/04/15/3

Summary: cups new web interface XSS security issue fixed in 1.7.2 => cups new web interface XSS security issue fixed in 1.7.2 (CVE-2014-2856)

Comment 3 David Walser 2014-04-22 16:37:51 CEST
Patched packages uploaded for Mageia 3, Mageia 4, and Cauldron.

RedHat said they were unable to reproduce the issue, but I haven't seen any specific PoC information.

Advisory:
========================

Updated cups packages fix security vulnerability:

Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix
Printing System (CUPS) before 1.7.2 allows remote attackers to inject
arbitrary web script or HTML via the URL path, related to the is_path_absolute
function (CVE-2014-2856).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2856
http://www.cups.org/str.php?L4356
========================

Updated packages in core/updates_testing:
========================
cups-1.5.4-9.2.mga3
cups-common-1.5.4-9.2.mga3
libcups2-1.5.4-9.2.mga3
libcups2-devel-1.5.4-9.2.mga3
cups-serial-1.5.4-9.2.mga3
php-cups-1.5.4-9.2.mga3cups-1.7.0-7.1.mga4
cups-common-1.7.0-7.1.mga4
libcups2-devel-1.7.0-7.1.mga4
libcups2-1.7.0-7.1.mga4
cups-filesystem-1.7.0-7.1.mga4

from SRPMS:
cups-1.5.4-9.2.mga3.src.rpm
cups-1.7.0-7.1.mga4.src.rpm

Version: Cauldron => 4
Assignee: thierry.vignaud => qa-bugs
Whiteboard: MGA4TOO, MGA3TOO => MGA3TOO
Severity: normal => major

Comment 4 claire robinson 2014-04-23 08:38:40 CEST
PoC:

$ curl "http://localhost:631/<SCRIPT>alert('document.domain='+document.domain)</SCRIPT>.shtml"


General testing, ensure the web interface at http://localhost:631 is still functional and printing works as expected.

Whiteboard: MGA3TOO => MGA3TOO has_procedure

Comment 5 claire robinson 2014-04-23 08:56:03 CEST
Better PoC: http://localhost:631/<SCRIPT>alert(123);</SCRIPT>.shtml

It should produce a popup alert with 123 as text. It doesn't here mga4 64, just shows 'Not Found', and wasn't reproduced by cups devs either. Assume it must need some special setup.

Confirmed the patch has been applied with madb. I'll test the update shortly.
Comment 6 claire robinson 2014-04-23 15:03:22 CEST
Testing complete mga4 64 and mga3 32

Whiteboard: MGA3TOO has_procedure => MGA3TOO has_procedure mga3-32-ok mga4-64-ok

Comment 7 claire robinson 2014-04-23 17:44:36 CEST
Testing complete mga4 32

Needs testing mga3 64 to validate

Whiteboard: MGA3TOO has_procedure mga3-32-ok mga4-64-ok => MGA3TOO has_procedure mga3-32-ok mga4-32-ok mga4-64-ok

Comment 8 claire robinson 2014-04-24 15:07:04 CEST
Testing complete mga3 64

Whiteboard: MGA3TOO has_procedure mga3-32-ok mga4-32-ok mga4-64-ok => MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok

Comment 9 claire robinson 2014-04-24 18:09:03 CEST
Validating. Advisory uploaded.

Could sysadmin please push to 3 & 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok => MGA3TOO has_procedure advisory mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok
CC: (none) => sysadmin-bugs

Comment 10 Thomas Backlund 2014-04-24 21:15:47 CEST
Update pushed:
http://advisories.mageia.org/MGASA-2014-0193.html

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED

David Walser 2014-04-25 19:01:56 CEST

URL: (none) => http://lwn.net/Vulnerabilities/596237/


Note You need to log in before you can comment on or make changes to this bug.