lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 12 Feb 2015 08:48:46 +0100 (CET)
From: Martin Heiland <martin.heiland@...n-xchange.com>
To: bugtraq <bugtraq@...urityfocus.com>
Subject: Open-Xchange Security Advisory 2015-02-12

Product: Open-Xchange Server 6 / OX AppSuite
Vendor: Open-Xchange GmbH

Internal reference: 35889 (Bug ID)
Vulnerability type: Information Exposure (CWE-200)
Vulnerable version: 7.6.1 and earlier
Vulnerable component: backend
Report confidence: Confirmed
Solution status: Fixed by Vendor
Fixed version: 7.4.2-rev42, 7.6.0-rev36, 7.6.1-rev14
Vendor notification: 2014-12-17
Solution date: 2015-01-13
CVE reference: CVE-2014-9466
CVSSv2: 6.0 (AV:N/AC:M/Au:S/C:P/I:N/A:N/E:F/RL:U/RC:C/CDP:MH/TD:H/CR:M/IR:ND/AR:ND)

Vulnerability Details:
Publications allow sharing files with external data consumers. Access to those is secured with a random hash and publications allow access to the shared directory or file only. However, since the folder identifier has not been properly taken into consideration when calculating permissions, a user that obtained access to the publication is able to access other files which are not intentionally published by the owner.

Risk:
External users that have valid access to a publication may access files that are not intended to be shared with them.

Solution:
Users should update to the latest patch releases 7.4.2-rev42, 7.6.0-rev36 and 7.6.1-rev14 (or later).

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ