Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 204335 - www-apps/joomla security status
Summary: www-apps/joomla security status
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High enhancement (vote)
Assignee: Gentoo Security
URL: http://www.securityfocus.com/archive/...
Whiteboard: ? [noglsa]
Keywords:
: 207043 210672 (view as bug list)
Depends on:
Blocks: 211166
  Show dependency tree
 
Reported: 2008-01-04 20:36 UTC by Lars Hartmann
Modified: 2010-01-11 09:31 UTC (History)
14 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Lars Hartmann 2008-01-04 20:36:07 UTC
Multiple cross-site request forgery (CSRF) vulnerabilities in Joomla! before 1.5 RC4 allow remote attackers to (1) add a Super Admin, (2) upload an extension containing arbitrary PHP code, and (3) modify the configuration as administrators via unspecified vectors.

Reproducible: Always
Comment 1 Lars Hartmann 2008-01-04 20:37:54 UTC
maintainers - please advise
Comment 2 Gunnar Wrobel (RETIRED) gentoo-dev 2008-01-17 09:32:21 UTC
We don't have the 1.5-release series in Portage yet. There are only release candidates available.

I'd suggest to wait for 1.0.14. A release candidate for this version has been made available recently.
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2008-01-17 14:09:26 UTC
Thx Gunnar. Given that impact is pretty serious it would be best if we don't wait too long though.
Comment 4 Jakub Moc (RETIRED) gentoo-dev 2008-01-22 14:30:22 UTC
*** Bug 207043 has been marked as a duplicate of this bug. ***
Comment 5 Jakub Moc (RETIRED) gentoo-dev 2008-01-22 14:49:39 UTC
1.5.0 final is out...

http://www.joomla.org/content/view/4488/1/
Comment 6 Gunnar Wrobel (RETIRED) gentoo-dev 2008-01-23 09:30:27 UTC
added joomla-1.5.0. unstable on all archs. removed insecure 1.0.13. webapps done.
Comment 7 Christian Faulhammer (RETIRED) gentoo-dev 2008-01-23 11:41:58 UTC
There is a 1.0.14 on the way (RC status at the moment).  1.5 is really completely rewritten and I won't migrate my current web page to it, so maybe waiting for another 1.0.x release is the way to go, as Gunnar already suggested.  The security breaches are known since December anyway...
Comment 8 Jakub Moc (RETIRED) gentoo-dev 2008-02-06 11:56:22 UTC
http://www.joomla.org/component/option,com_jd-wp/Itemid,105/p,486/

<snip>
After releasing Joomla! 1.5 stable we have discovered a high priority security issue. The vulnerability has been discovered in XML-RPC in combination with the blogger API. There is a security problem in this code that makes it possible to alter the articles on your site (including removal). This problems has been fixed currently by members of the development team and the Joomla! bug squad, solution is now available from Subversion. So what do you need to do until we release Joomla! 1.5.1?

    All Joomla! users who have enabled the XML-RPC Blogger API plugin should disable it! 

If you have never enabled this plugin you do not need to do anything.
</snip>

Wonderful, plop!
Comment 9 Robert Buchholz (RETIRED) gentoo-dev 2008-02-11 21:59:26 UTC
Joomla is ~arch only.
Comment 10 Christian Faulhammer (RETIRED) gentoo-dev 2008-02-17 10:19:29 UTC
1.0.14 is released now, maybe this option should still be offered.
Comment 11 oc666 2008-02-17 11:18:56 UTC
Joomla 1.5.1 is also released. I think it's fix the bug with the XML-RPC.
Comment 12 oc666 2008-02-17 12:39:37 UTC
(In reply to comment #11)
> Joomla 1.5.1 is also released. I think it's fix the bug with the XML-RPC.
> 

According to this:
http://www.joomla.org/content/view/4560/1/
This bug fixed on Joomla 1.5.1 version.
Comment 13 Jakub Moc (RETIRED) gentoo-dev 2008-02-19 09:20:23 UTC
*** Bug 210672 has been marked as a duplicate of this bug. ***
Comment 14 Benedikt Böhm (RETIRED) gentoo-dev 2008-02-23 11:22:06 UTC
1.5.1 in cvs ... looking at the CVE history for joomla, i'd suggest to handle it like we do already with wordpress, hard-mask and scream that this crap is in no way security supported ..
Comment 15 Jakub Moc (RETIRED) gentoo-dev 2008-02-23 11:33:18 UTC
(In reply to comment #14)
> 1.5.1 in cvs ... looking at the CVE history for joomla, i'd suggest to handle
> it like we do already with wordpress, hard-mask and scream that this crap is in
> no way security supported ..

+1 on this... 

Comment 16 Benedikt Böhm (RETIRED) gentoo-dev 2008-02-23 11:54:51 UTC
masked
Comment 17 oc666 2008-02-23 17:42:44 UTC
Why did you remove joomla 1.0.x?
I assume that this version have less bugs than 1.5.x version.
Comment 18 Benedikt Böhm (RETIRED) gentoo-dev 2008-02-23 20:52:00 UTC
i've readded the 1.0 branch wrt comment #7 and #17 .. this won't affect the security mask though
Comment 19 MasterC 2008-04-09 20:59:43 UTC
(In reply to comment #14)
> 1.5.1 in cvs ... looking at the CVE history for joomla, i'd suggest to handle
> it like we do already with wordpress, hard-mask and scream that this crap is in
> no way security supported ..
> 

I don't understand the hard mask.  If there are security flaws they should be reported upstream just like any other package.  This logic says we should hard mask everything until enough decades have passed to obsolete the package enough that security is no longer an issue as nobody uses it any longer...  I realize nothing stops me from downloading the tarball from joomla.org and installing it, but this defeats the purpose of using Gentoo.  I can also unmask it and emerge it, but you are putting up a large barrier for many users by hard masking it; why do we even have ~x86 anymore if everything is constantly getting hard masked?
Comment 20 Robert Buchholz (RETIRED) gentoo-dev 2008-04-10 12:31:20 UTC
(In reply to comment #19)
The statement we are making by hard masking the package is that we cannot support the package security-wise, but that we expect this to be temporary (otherwise it would be simply removed). The difference this has to ~arch packages is that those *are* security supported, and we will track every single vulnerability that we come across and that will torture our maintainers.

I would expect the mask to be removed once Joomla's security track improves, I'm not sure if the 1.5 version brought news there.
Comment 21 MasterC 2008-04-10 17:57:06 UTC
(In reply to comment #20)
> (In reply to comment #19)
> The statement we are making by hard masking the package is that we cannot
> support the package security-wise, but that we expect this to be temporary
> (otherwise it would be simply removed). The difference this has to ~arch
> packages is that those *are* security supported, and we will track every single
> vulnerability that we come across and that will torture our maintainers.
> 
> I would expect the mask to be removed once Joomla's security track improves,
> I'm not sure if the 1.5 version brought news there.
> 

Thank you for the clarification :)
Comment 22 Benedikt Böhm (RETIRED) gentoo-dev 2008-04-10 18:29:03 UTC
(In reply to comment #20)
> I would expect the mask to be removed once Joomla's security track improves,
> I'm not sure if the 1.5 version brought news there.

well, 1.5 is still young, but has not seen a security vulnerability yet, afaics. we could change the mask to =joomla-1.0* only

Comment 23 Jerome Asselin 2008-04-16 01:10:23 UTC
Could you please bump the ebuild to 1.5.2? Thanks.
Comment 24 Jerome Asselin 2008-04-24 17:41:50 UTC
(In reply to comment #23)
> Could you please bump the ebuild to 1.5.2? Thanks.

Please make it 1.5.3 instead...
Comment 25 Gunnar Wrobel (RETIRED) gentoo-dev 2008-04-27 06:22:10 UTC
1.5.3 in cvs
Comment 26 Bill Binder 2008-10-21 19:41:22 UTC
(In reply to comment #20)
> I would expect the mask to be removed once Joomla's security track improves,
> I'm not sure if the 1.5 version brought news there.
> 

From Secunia website:
"
Unpatched        0% (0 of 18 Secunia advisories)

Most Critical Unpatched
There are no unpatched Secunia advisories affecting this product, when all vendor patches are applied..
"
which appears to refer to 1.5.7
Comment 27 Gunnar Wrobel (RETIRED) gentoo-dev 2008-10-30 15:20:26 UTC
@bill: If joomla would simply leave any sec issue open it would be removed from the tree immediately. It is currently hard masked as the frequency of discovered security issues is too high for us to maintain it security wise.
Comment 28 Stefan Behte (RETIRED) gentoo-dev Security 2009-01-02 21:50:05 UTC
https://bugs.gentoo.org/253483
Comment 29 Stefan Behte (RETIRED) gentoo-dev Security 2009-11-07 06:55:28 UTC
This is a very old bug and everyone knows joomla often has security bugs.
Closing noglsa.
Comment 30 Christian Faulhammer (RETIRED) gentoo-dev 2010-01-06 11:17:52 UTC
Olivier Huber offered to take over maintenance.  As his proxy I hereby think that we should reconsider the security masking, if the maintenance proves to be reliable.  Security, are you ok with it?
Comment 31 Benedikt Böhm (RETIRED) gentoo-dev 2010-01-06 13:10:56 UTC
(In reply to comment #30)
> Olivier Huber offered to take over maintenance.  As his proxy I hereby think
> that we should reconsider the security masking, if the maintenance proves to be
> reliable.  Security, are you ok with it?

Well, the masking of joomla had nothing to do with not being able to commit version bumped ebuilds. But joomla, like the other apps in bug 211166 have a long history of security vulnerabilities and there is no improvement in sight. These applications shouldn't be used at all actually, but that's how life works with PHP apps ;)
Comment 32 Christian Faulhammer (RETIRED) gentoo-dev 2010-01-08 08:55:22 UTC
(In reply to comment #31)
> (In reply to comment #30)
> > Olivier Huber offered to take over maintenance.  As his proxy I hereby think
> > that we should reconsider the security masking, if the maintenance proves to be
> > reliable.  Security, are you ok with it?
> 
> Well, the masking of joomla had nothing to do with not being able to commit
> version bumped ebuilds. But joomla, like the other apps in bug 211166 have a
> long history of security vulnerabilities and there is no improvement in sight.
> These applications shouldn't be used at all actually, but that's how life works
> with PHP apps ;)

 Horde is impacted regularly, too (and PHP-based).  There was a problem with regular bumping as web-apps is badly understaffed...you know that well. :)  Anyway, we can start with a small step and introduce it into testing. Joomla's history of security problems is well-known but new ones seem to arise in a two to three months interval now.
Comment 33 Benedikt Böhm (RETIRED) gentoo-dev 2010-01-08 09:23:12 UTC
(In reply to comment #32)
>  Horde is impacted regularly, too (and PHP-based).  There was a problem with
> regular bumping as web-apps is badly understaffed...you know that well. :) 
> Anyway, we can start with a small step and introduce it into testing. Joomla's
> history of security problems is well-known but new ones seem to arise in a two
> to three months interval now.

Yeah, you probably shouldn't use horde as well ;) Anyway, i'm not against adding joomla again, i was just saying that there was more reason than simply not being able to commit a new ebuild ...
Comment 34 Christian Faulhammer (RETIRED) gentoo-dev 2010-01-08 09:25:41 UTC
security, any word from you?
Comment 35 Christian Faulhammer (RETIRED) gentoo-dev 2010-01-11 08:26:51 UTC
(In reply to comment #34)
> security, any word from you?

 So it is unmasked again.
Comment 36 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-01-11 09:15:55 UTC
I thought I replied. :o

Summing up what I typed already but somehow didn't send:
* Make sure that the version in the tree is not vulnerable to any known issues
* Remove all vulnerable ebuilds
* Try to have a good response time for the next bump.
* Contact us beforehand if you want to stabilize the package. 

And for the record: Horde's issues are not quite as grave as the things found in Joomla and I've been taking care of Horde for a time now, so we're fine there.
Comment 37 Christian Faulhammer (RETIRED) gentoo-dev 2010-01-11 09:31:44 UTC
(In reply to comment #36)
> * Make sure that the version in the tree is not vulnerable to any known issues

 Done.

> * Remove all vulnerable ebuilds

 Done now.

> * Try to have a good response time for the next bump.

 Olivier will assist me, I use it on my webspace (not Gentoo) and thus read the Joomla! security RSS.  This will hopefully help.

> * Contact us beforehand if you want to stabilize the package. 

 Of course.

> And for the record: Horde's issues are not quite as grave as the things found
> in Joomla and I've been taking care of Horde for a time now, so we're fine
> there.

 It was just an example. :)