Bug 33067 - perl(HTTP::Body) still affected by security issue CVE-2013-4407
Summary: perl(HTTP::Body) still affected by security issue CVE-2013-4407
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-04-09 10:08 CEST by Nicolas Salguero
Modified: 2024-04-13 18:57 CEST (History)
3 users (show)

See Also:
Source RPM: perl-HTTP-Body-1.220.0-6.mga9.src.rpm
CVE: CVE-2013-4407
Status comment:


Attachments

Description Nicolas Salguero 2024-04-09 10:08:14 CEST
According to https://www.openwall.com/lists/oss-security/2024/04/07/1, perl(HTTP::Body) is still affected by CVE-2013-4407.

Version 1.23 solves the problem.

Mageia 9 is also affected.
Nicolas Salguero 2024-04-09 10:09:29 CEST

Whiteboard: (none) => MGA9TOO
Source RPM: (none) => perl-HTTP-Body-1.220.0-6.mga9.src.rpm
CVE: (none) => CVE-2013-4407
Status comment: (none) => Fixed upstream in 1.23 (1.230.0)

Lewis Smith 2024-04-09 20:56:34 CEST

Assignee: bugsquad => perl

Comment 1 Nicolas Salguero 2024-04-11 09:27:25 CEST
Suggested advisory:
========================

The updated package really fixes a security vulnerability:

HTTP::Body::Multipart in the HTTP-Body 1.08, 1.17, and earlier module for Perl uses the part of the uploaded file's name after the first "." character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed. (CVE-2013-4407)

References:
https://www.openwall.com/lists/oss-security/2024/04/07/1
========================

Updated package in core/updates_testing:
========================
perl-HTTP-Body-1.230.0-1.mga9

from SRPM:
perl-HTTP-Body-1.230.0-1.mga9.src.rpm

Status: NEW => ASSIGNED
Whiteboard: MGA9TOO => (none)
Version: Cauldron => 9
Assignee: perl => qa-bugs
Status comment: Fixed upstream in 1.23 (1.230.0) => (none)

katnatek 2024-04-12 00:54:10 CEST

Keywords: (none) => advisory

Comment 2 Len Lawrence 2024-04-13 11:47:41 CEST
Mageia9, x64

In the CVEs, some of the filenames offered as example exploits look extremely dangerous so it is a case of "don't try this at home".

Updated the package without issues.  Installed perl-Dancer as a test framework depending on perl-HTTP-Body.
https://perldancer.org/quickstart presents enough information for a quick test.

Following the tutorial to the letter led nowhere but a little modification did give access to the dance floor at localhost:5000.

$ dancer gen -a MyWeb::App                    <Note not dancer2>

The latest stable Dancer release is 1.3521, you are currently using 1.3520.
Please check http://search.cpan.org/dist/Dancer/ for updates.

+ MyWeb-App
+ MyWeb-App/t
+ MyWeb-App/t/001_base.t
+ MyWeb-App/t/002_index_route.t
+ MyWeb-App/lib
+ MyWeb-App/lib/MyWeb
+ MyWeb-App/lib/MyWeb/App.pm
+ MyWeb-App/environments
+ MyWeb-App/environments/development.yml
+ MyWeb-App/environments/production.yml
+ MyWeb-App/views
+ MyWeb-App/views/layouts
+ MyWeb-App/views/layouts/main.tt
+ MyWeb-App/views/index.tt
+ MyWeb-App/config.yml
+ MyWeb-App/public
+ MyWeb-App/public/javascripts
+ MyWeb-App/public/javascripts/jquery.min.js
+ MyWeb-App/public/dispatch.cgi
+ MyWeb-App/public/css
+ MyWeb-App/public/css/style.css
+ MyWeb-App/public/css/error.css
+ MyWeb-App/public/dispatch.fcgi
+ MyWeb-App/public/500.html
+ MyWeb-App/public/404.html
+ MyWeb-App/public/images
+ MyWeb-App/bin
+ MyWeb-App/bin/app.pl
+ MyWeb-App/Makefile.PL
+ MyWeb-App/MANIFEST.SKIP

$ tree -d MyWeb-App
MyWeb-App
├── bin
├── environments
├── lib
│   └── MyWeb
├── public
│   ├── css
│   ├── images
│   └── javascripts
├── t
└── views
    └── layouts

$ plackup -r bin/app.pl                        <Note: app.pl not app.psgi>
Watching bin/app.pl for file updates.
[2666994]  core @0.000003> PLACK_ENV is set (development) forcing PSGI handler in /usr/share/perl5/vendor_perl/Dancer/Handler.pm l. 33
[2666994]  core @0.000308> loading Dancer::Handler::PSGI handler in /usr/share/perl5/vendor_perl/Dancer/Handler.pm l. 47

The introductory page appears at localhost:5000.

This should be enough.

Whiteboard: (none) => MGA9-64-OK
CC: (none) => tarazed25

Comment 3 Thomas Andrews 2024-04-13 16:54:21 CEST
Tango, polka, or waltz? 

Validating, no matter which.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 4 Mageia Robot 2024-04-13 18:57:26 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2024-0127.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.