Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 235005 (CVE-2008-1129) - www-apps/xrms Multiple vulnerabilities (CVE-2008-{1129,3398,3399,3400,3664})
Summary: www-apps/xrms Multiple vulnerabilities (CVE-2008-{1129,3398,3399,3400,3664})
Status: RESOLVED FIXED
Alias: CVE-2008-1129
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High enhancement (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~3 [masked | noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-08-17 11:17 UTC by Robert Buchholz (RETIRED)
Modified: 2008-10-11 19:14 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-08-17 11:17:18 UTC
CVE-2008-1129 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1129):
  Cross-site scripting (XSS) vulnerability in admin/users/self.php in XRMS CRM
  allows remote attackers to inject arbitrary web script or HTML via the msg
  parameter.  NOTE: some of these details are obtained from third party
  information.

CVE-2008-3398 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3398):
  Multiple cross-site scripting (XSS) vulnerabilities in XRMS CRM 1.99.2 allow
  remote attackers to inject arbitrary web script or HTML via the msg parameter
  to unspecified components, possibly including login.php. NOTE: this may
  overlap CVE-2008-1129.

CVE-2008-3399 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3399):
  PHP remote file inclusion vulnerability in activities/workflow-activities.php
  in XRMS CRM 1.99.2, when register_globals is enabled, allows remote attackers
  to execute arbitrary PHP code via the include_directory parameter.

CVE-2008-3400 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3400):
  XRMS CRM 1.99.2 allows remote attackers to obtain configuration information
  via a direct request to tests/info.php, which calls the phpinfo function.
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2008-08-17 17:33:00 UTC
In addition to the previous items, we have more XSS:
http://sourceforge.net/tracker/index.php?func=detail&aid=2042714&group_id=88850&atid=588128

There are also issues in the SQL, at several places unsanitized input is passed in the statement, for instance the 'edit_user_id' POST parameter in admin/users/self-2.php
Comment 3 Robert Buchholz (RETIRED) gentoo-dev 2008-08-17 17:57:12 UTC
I think all of the bugs are tracked upstream now, but I wonder if this web application should remain part of our distribution, as it does not seem to have a too good security track record.
Comment 4 Christian Hoffmann (RETIRED) gentoo-dev 2008-08-25 23:09:21 UTC
+# Christian Hoffmann <hoffie@gentoo.org> (26 Aug 2008)
+# Masked for security, bug 235005, uncooperative upstream (they do not
+# consider XSS a security problem, as referenced in the bug)
+www-apps/xrms

As approved by rbu. Updating whiteboard, no clue if we are waiting for upstream to provide a fix or should be finally removing it.
Comment 5 Gunnar Wrobel (RETIRED) gentoo-dev 2008-09-09 20:00:27 UTC
The xrms developer comments concerning XSS are outright ridiculus. Taking the amount of issues and the current development activity into account I also consider this a candidate for removal. Issued last rites on gentoo-dev.
Comment 6 Robert Buchholz (RETIRED) gentoo-dev 2008-09-10 10:40:38 UTC
NO maskglsa, please close this bug once the ebuild is removed.
Comment 7 Robert Buchholz (RETIRED) gentoo-dev 2008-09-12 13:31:31 UTC
CVE-2008-3664 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3664):
  Multiple cross-site scripting (XSS) vulnerabilities in XRMS allow
  remote attackers to inject arbitrary web script or HTML via (1) the
  real name field, related to the user list; (2) the target parameter
  to login.php, (3) the title parameter to activities/some.php, (4) the
  company_name parameter to companies/some.php, (5) the last_name
  parameter to contacts/some.php, (6) the campaign_title parameter to
  campaigns/some.php, (7) the opportunity_title parameter to
  opportunities/some.php, (8) the case_title parameter to
  cases/some.php, (9) the file_id parameter to files/some.php, or (10)
  the starting parameter to reports/custom/mileage.php, a related issue
  to CVE-2008-1129.
Comment 8 Robert Buchholz (RETIRED) gentoo-dev 2008-09-12 14:09:27 UTC
CVE-2008-3948 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3948):
  SQL injection vulnerability in admin/users/self-2.php in XRMS allows
  remote attackers to execute arbitrary SQL commands and modify name
  and email fields via unspecified vectors.
Comment 9 Gunnar Wrobel (RETIRED) gentoo-dev 2008-10-11 19:14:31 UTC
Removed www-apps/xrms.