Bug 15402 - dokuwiki new security issue CVE-2015-2172
Summary: dokuwiki new security issue CVE-2015-2172
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/635766/
Whiteboard: advisory MGA4-32-OK MGA4-64-OK
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-03-02 22:05 CET by David Walser
Modified: 2015-03-06 22:31 CET (History)
3 users (show)

See Also:
Source RPM: dokuwiki-20140929-1.2.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-03-02 22:05:17 CET
A CVE has been assigned for an issue fixed upstream in 20140929c:
http://openwall.com/lists/oss-security/2015/03/02/2

This was from a security hotfix:
https://www.dokuwiki.org/changes#release_2014-09-29c_hrun

Reproducible: 

Steps to Reproduce:
David Walser 2015-03-02 22:05:28 CET

Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 Atilla ÖNTAŞ 2015-03-03 00:21:36 CET
(In reply to David Walser from comment #0)
> A CVE has been assigned for an issue fixed upstream in 20140929c:
> http://openwall.com/lists/oss-security/2015/03/02/2
> 
> This was from a security hotfix:
> https://www.dokuwiki.org/changes#release_2014-09-29c_hrun
> 
> Reproducible: 
> 
> Steps to Reproduce:

Committed in svn and asked for freeze push for Cauldron
Comment 2 David Walser 2015-03-03 17:53:46 CET
Updated packages uploaded for Mageia 4 and Cauldron.  Thanks Atilla!

Advisory:
========================

Updated dokuwiki package fixes security vulnerability:

DokuWiki before 20140929c has a security issue in the ACL plugins remote API
component. The plugin failed to check for superuser permissions before
executing ACL addition or deletion. This means everybody with permissions to
call the XMLRPC API also had permissions to set up their own ACL rules and thus
circumventing any existing rules (CVE-2015-2172).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2172
https://github.com/splitbrain/dokuwiki/issues/1056
https://www.dokuwiki.org/changes#release_2014-09-29c_hrun
========================

Updated packages in core/updates_testing:
========================
dokuwiki-20140929-1.3.mga4

from dokuwiki-20140929-1.3.mga4.src.rpm

CC: (none) => tarakbumba
Version: Cauldron => 4
Assignee: tarakbumba => qa-bugs
Whiteboard: MGA5TOO, MGA4TOO => (none)

David Walser 2015-03-03 17:58:11 CET

Severity: normal => major

Comment 3 William Murphy 2015-03-05 12:35:08 CET
Tested on mga4 64 & 32 bit virtualbox installs.

Attempted login with null byte insertion according to notes provided by
http://www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authentication
with no success. Connection attempts to the active directory provided (@54.68.122.145) returned invalid credentials using both authad and authldap, so tried inserting a null byte to the local ldap server.

Confirmed proxpy was replacing 'NULLBYTE' with url-encoded %00 using the user name field and either routing through the proxy or connecting directly. Dokuwiki didn't query the ldap server for the username, password and login failed when attempting to insert a null byte at the beginning of the password field. Same when inserting the null byte to both the user name and passwords fields.

After updating, dokuwiki continues to run without problems. Also installed new, enabling and configured the authldap plugin worked without incident.

Everything seems to be working Ok.

========================

Testing complete for mga4 32-bit & 64-bit
Validating the update.
Could someone from the sysadmin team push this to updates.
Thanks much.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs, warrendiogenese
Whiteboard: (none) => MGA4-32-OK MGA4-64-OK

Comment 4 claire robinson 2015-03-05 18:19:19 CET
Thanks William. Advisory uploaded.

Whiteboard: MGA4-32-OK MGA4-64-OK => advisory MGA4-32-OK MGA4-64-OK

Comment 5 Mageia Robot 2015-03-05 20:35:03 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0093.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2015-03-06 22:31:44 CET

URL: (none) => http://lwn.net/Vulnerabilities/635766/


Note You need to log in before you can comment on or make changes to this bug.