[Secure-testing-team] Bug#635544: Insufficient blacklist

Moritz Muehlenhoff jmm at debian.org
Tue Jul 26 20:32:29 UTC 2011


Package: glpi
Severity: important
Tags: security

The following was reported to oss-security:

--------
  it was found that GLPI, the Information Resource-Manager with an
additional Administration-Interface, did not properly blacklist
certain sensitive variables (like GLPI username and password). A
remote attacker could use this flaw to obtain access to plaintext form
of these values via specially-crafted HTTP POST request.

References:
[1] http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
[2] https://forge.indepnet.net/projects/glpi/versions/605
[3] https://forge.indepnet.net/issues/3017

Relevant patches:
[4]  https://forge.indepnet.net/projects/glpi/repository/revisions/14951
[5]  https://forge.indepnet.net/projects/glpi/repository/revisions/14952
[6]  https://forge.indepnet.net/projects/glpi/repository/revisions/14954
[7]  https://forge.indepnet.net/projects/glpi/repository/revisions/14955
[8]  https://forge.indepnet.net/projects/glpi/repository/revisions/14956
[9]  https://forge.indepnet.net/projects/glpi/repository/revisions/14957
[10] https://forge.indepnet.net/projects/glpi/repository/revisions/14958
[11] https://forge.indepnet.net/projects/glpi/repository/revisions/14960
[12] https://forge.indepnet.net/projects/glpi/repository/revisions/14966
--------

Since security support for glpi is limited it's sufficient to fix it
up in unstable.

Cheers,
        Moritz

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash





More information about the Secure-testing-team mailing list