txt plain text

Security Alert: Local file inclusion vulnerability in viewfile

IDEA! Get Alerted: to get immediate alerts of high priority security issues, please join the low-volume foswiki-announce list - details at MailingLists

The filename parameter isn't validated sufficiently and may be used to read any file on the server.

Severity Level

Severity 1 issue: The web server can be compromised

The severity level was assigned by the Foswiki SecurityTaskTeam as documented in SecurityAlertProcess

MITRE Name for this Vulnerability

The Common Vulnerabilities and Exposures project has assigned the name CVE-2023-24698 to this vulnerability.

Vulnerable Software Versions

Fixed in Foswiki 2.1.8

Attack Vectors

A proof of concept isn't included here for security reasons. The attack can be scripted using curl. The POC submitted by Steffen Weinreich allowed to read /etc/passwd but basically any file could be accessed such as lib/LocalSite.cfg containing sensitive information like passwords and configiration details.

Impact

Any file accessible by the user running the foswiki services (e.g. www-data) can be accessed using a specially crafted http request to the viewfile endpoint.

Details

The filename parameter isn't validated sufficiently in Foswiki::Sandbox Basically any component using Foswiki::Sandbox::validateAttachmentName will be affected, not only viewfile. Yet viewfile is the most obvious vector.

Countermeasures

Authors and Credits

  • Steffen Weinreich <steve@weinreich.org>

Action Plan with Timeline

  • 2022-08-05: Michael Daum was contacted by Steffen Weinreich <steve@weinreich.org>
  • 2022-08-05: The POC was confirmed and the bug was analysed
  • 2022-08-05: a preliminary patch was applied to foswiki.org and blog.foswiki.org to secure the system
  • 2022-08-05: hotfix made available, security ML was informed
  • 2022-08-06: updated hotfix
  • 2022-10-22: CVE Request 1349733 for CVE ID Request ... first attempt
  • 2023-01-26: CVE Request 1397709 for CVE ID Request ... second attempt
  • 2023-03-08: CVE-2023-24698 approved
  • 2023-08-06: fix released in Foswiki-2.1.8
Topic revision: r3 - 06 Aug 2023, MichaelDaum
The copyright of the content on this website is held by the contributing authors, except where stated elsewhere. See Copyright Statement. Creative Commons License    Legal Imprint    Privacy Policy