[Secure-testing-team] Bug#683288: rt-authen-externalauth: privilege escalation
Yves-Alexis Perez
corsac at debian.org
Mon Jul 30 14:55:31 UTC 2012
Package: rt-authen-externalauth
Severity: grave
Tags: security
Justification: user security hole
Hi,
a security issue has been found in rt-authen-externalauth package. From
http://blog.bestpractical.com/2012/07/security-vulnerabilities-in-three-commonly-deployed-rt-extensions.html:
----
RT::Authen::ExternalAuth 0.10 and below (for all versions of RT) are
vulnerable to an escalation of privilege attack where the URL of a RSS
feed of the user can be used to acquire a fully logged-in session as
that user. CVE-2012-2770 has been assigned to this vulnerability.
----
For Wheezy, please fix this with an isolated fix instead of updating to a
new upstream release (since the freeze is in effect)
Regards,
--
Yves-Alexis
-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 3.2.0-3-grsec-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
More information about the Secure-testing-team
mailing list