-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security update: CVE-2017-5870 and CVE-2017-6086 #250
Comments
No solution yet in place and no immediate free time to look at this. However this issue has bumped it back into my list of priorities. If anyone wants to contribute to pushing this further up the list, the commercial support route would be a practical way of doing this. ViMbAdmin is used by the vast majority of users as an in-house single-organisation tool and as such the exposure of both if these CVE's is - to my mind - much less than the CVE assigned scores. |
@barryo As both of these are CSFR issues, I would certainly say they warrant the level of CVE assignment, even if they are in-house single-organization installs. These smaller systems mean smaller teams, and impact could be catastrophic for a small organization (or person) that can't figure out what's going on. That being said, CSFRs are easy to fix. In any PHP header file that has a form in it, just add:
In the
And after submit, before any functions are called, add:
This would eliminate both CVEs. |
I should note, the above solution uses Some saying just using |
I'm about to fork and work on a PR. |
OK, I've started CSFR fixes on POSTS, but I realize the CVE also has GET issues, too. I wasn't sure of the details on your Zend implementation since much of it looks custom in your framework, so I did it the old fashion way, but it's clean, matches your code structure, and works. Here's a commit with one form fixed. Let me know if you have issues with this structure as I'm going to use it across all forms, and then address the GET issues. EDIT EDIT 2 EDIT 3 |
Hi @Fmstrat - thanks for the effort here. Unfortunately, the way you've done it is not how we'd go about it (but it's close). We've already solved this in another project using the same backend code. Here are some links:
I've no issue looking at this when I have time, but if you want to look at it, the above should help. To accept a more significant piece of code like this into the project, I'd also need you to sign an as yet unwritten CLA but something like this: https://github.com/inex/IXP-Manager/wiki/Contributor-License-Agreement (side note: mcrypt is deprecated, please use random_bytes()) |
@barryo Yeaaaaa since I'm not that familiar with Zend, sounds like it would take me waaaaayyyy longer than makes sense given you already have a solution in place elsewhere. I'd love to help, but I might not be the right person (given the time I have currently). |
It seems there are multiple cross-site request forgery (CSRF) vulnerabilities within the latest version of ViMbAdmin. Can we get a status on these fixes?
Seems the timeline states that you don't have time to fix bask in 2017, but wondering if any solution is in place now?
References:
The text was updated successfully, but these errors were encountered: