Home page logo
/

oss-sec logo oss-sec mailing list archives

Re: CVE request: cobbler lack of csrf protection, code execution
From: Jan Lieskovsky <jlieskov () redhat com>
Date: Thu, 12 Apr 2012 13:46:16 +0200

Thank you for this post, David.

Just administrative note -- all of these security issues should
get CVE-2011-* CVE identifiers, as all of the Ubuntu bugs have
been reported in 2011 yet (2011-09-28 exactly).

On 04/12/2012 11:39 AM, David Black wrote:
Hi, I reported some bugs a while ago in cobbler which never received
CVE ID, could the follow bugs receive CVE ID ?
1. lack of csrf protection in the cobbler web interface (vulnerable to
csrf attacks) https://bugs.launchpad.net/ubuntu/oneiric/+source/cobbler/+bug/858878

Some further references / patches information I was able to found:
1) Ubuntu patch by Robie Basak:
   http://bazaar.launchpad.net/~racb/ubuntu/oneiric/cobbler/858878_858883/revision/53

2) Red Hat bugzilla entry:
   https://bugzilla.redhat.com/show_bug.cgi?id=811937

2. code execution on the cobbler host through use of yaml.loads on
potentially untrusted user input
https://bugs.launchpad.net/ubuntu/oneiric/+source/cobbler/+bug/858883

Though only yaml.load privilege escalation vector has been mentioned in this
post, from further look noticed two ways for privilege escalation:
1) (possibly remote) privilege escalation via yaml.load / by
   processing management parameters:

   References:
   https://bugs.launchpad.net/ubuntu/oneiric/+source/cobbler/+bug/858883 (Ubuntu bug)

   Ubuntu patch from Robie Basak:
   * Backport safe YAML load from upstream. (LP: #858883):
   http://bazaar.launchpad.net/~racb/ubuntu/oneiric/cobbler/858878_858883/revision/54

   https://bugzilla.redhat.com/show_bug.cgi?id=811920 (Red Hat bug)

2) local privilege escalation due to insecure use of PYTHON_EGG_CACHE location:

   References:
   https://bugs.launchpad.net/ubuntu/+source/cobbler/+bug/858875 (Ubuntu bug)
   https://fedorahosted.org/cobbler/ticket/688 (upstream ticket)
   https://d-feet.fedorahosted.org/cobbler/attachment/ticket/688/58_fix_egg_cache.patch
   (relevant upstream patch)
   https://bugzilla.redhat.com/show_bug.cgi?id=811926 (Red Hat bug)

Kurt, could you allocate three 2011 CVE ids for these issues?
i)   the first for CSRF issue,
ii)  the second for the yaml.load priv esc issue,
iii) the third for the PYTHON_EGG_CACHE local priv esc issue

David, would be great if you could confirm the three ids are necessary.

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team


--
Thank you.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]