Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 281517 (CVE-2009-2737) - <www-apps/roundup-1.4.11: EditCVSAction() permission bypass (CVE-2009-2737)
Summary: <www-apps/roundup-1.4.11: EditCVSAction() permission bypass (CVE-2009-2737)
Status: RESOLVED FIXED
Alias: CVE-2009-2737
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-08-14 22:31 UTC by Alex Legler (RETIRED)
Modified: 2012-03-11 06:49 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alex Legler (RETIRED) archtester gentoo-dev Security 2009-08-14 22:31:24 UTC
CVE-2009-2737 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2737):
  The EditCSVAction function in cgi/actions.py in Roundup 1.2 before
  1.2.1, 1.4 through 1.4.6, and possibly other versions does not
  properly check permissions, which allows remote authenticated users
  with edit or create privileges for a class to modify arbitrary items
  within that class, as demonstrated by editing all queries, modifying
  settings, and adding roles to users.
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-08-14 22:32:04 UTC
Please remove versions <= 1.4.16.
Investigation needed for 1.4.18
Comment 2 Stefan Behte (RETIRED) gentoo-dev Security 2009-11-06 23:29:44 UTC
Upstream: http://issues.roundup-tracker.org/issue2550521
The method was rewritten in 1.4.8, 1.4.6 needs the (one-word) patch.
Comment 3 Sean Amoss (RETIRED) gentoo-dev Security 2012-03-09 18:35:38 UTC
GLSA vote: no.
Comment 4 Tim Sammut (RETIRED) gentoo-dev 2012-03-11 06:49:00 UTC
GLSA Vote: no too, closing.