Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 493434 (CVE-2013-7070) - <www-misc/monitorix-3.5.1: HTTP server 'handle_request()' session fixation & XSS vulnerabilities (CVE-2013-{7070,7071,7072})
Summary: <www-misc/monitorix-3.5.1: HTTP server 'handle_request()' session fixation & ...
Status: RESOLVED FIXED
Alias: CVE-2013-7070
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-12-06 11:01 UTC by Agostino Sarubbo
Modified: 2014-05-23 17:35 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
monitorix-3.5.0.ebuild (monitorix-3.5.0.ebuild,2.57 KB, text/plain)
2014-04-05 19:46 UTC, Wojciech Myrda
no flags Details
monitorix-3.5.0.init (monitorix-3.5.0.init,659 bytes, text/plain)
2014-04-05 19:47 UTC, Wojciech Myrda
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-12-06 11:01:48 UTC
From ${URL} :

Monitorix, an open source system monitoring tool, was found to be vulnerable to two XSS vulnerabilities, 
which could allow attackers to execute arbitrary script code in a user's browser in the context of the Web 
server process, access sensitive data, or hijack a user's session.

The issue is that the built-in HTTP server failed to adequately sanitize request strings of malicious 
JavaScript. So by leveraging this issue, an attacker may be able to inject arbitrary cookies. The same 
issue could also cause arbitrary HTML and script code to be executed in a user's browser within the 
security context of the affected site. Input passed via requests to the "handle_request()" function 
(lib/HTTPServer.pm) is not properly sanitised before being returned to the user. This can be exploited to 
execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The issue is said to be fixed in Monitorix 3.40.

References:
http://www.securityfocus.com/bid/63913/info
http://secunia.com/advisories/55857/
http://www.monitorix.org/news.html#N340


@maintainer(s): since the package has never been marked as stable, we don't need to stabilize it. After the bump, please remove the affected versions from the tree.
Comment 1 Wojciech Myrda 2014-04-05 19:46:25 UTC
Created attachment 374326 [details]
monitorix-3.5.0.ebuild

The issue at the given Fedora link has been given medium status not trivial... Regardless of whatever it should be I have created ebuild for just released version 3.5.0. It have made some nice additions http://www.monitorix.org/news.html#N350 and changes at the same time. One of them is it checks for config at the new location as well hence the need of changed init file.

Anyway I hope after review it makes in into portage tree as it seems quite some time for the security bug to be open.

regards,
WM
Comment 2 Wojciech Myrda 2014-04-05 19:47:14 UTC
Created attachment 374330 [details]
monitorix-3.5.0.init
Comment 3 Tom Wijsman (TomWij) (RETIRED) gentoo-dev 2014-05-23 15:57:56 UTC
Thank you very much for contributing; reviewed, minor changes (sort dependencies, shortened post install mesasges) and added support for systemd unit.

+  23 May 2014; Tom Wijsman <TomWij@gentoo.org> +files/monitorix-3.5.1.init,
+  +monitorix-3.5.1.ebuild, -files/monitorix-3.0.0.init,
+  -monitorix-3.0.0-r1.ebuild, -monitorix-3.1.0.ebuild, -monitorix-3.2.1.ebuild,
+  metadata.xml:
+  Version bump to 3.5.1, removed old, added systemd unit support. Fixed security
+  bug #493434 (CVE-2013-7071); reported by Ago, based on a contribution by
+  Wojciech Myrda (vojcek).

Security team, please proceed.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2014-05-23 17:34:39 UTC
Maintainer(s), Thank you for your work and cleanup!

No GLSA needed as there are no stable versions.