Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 567316 (CVE-2015-8400) - <www-misc/shellinabox-2.19: DNS rebinding attack due to HTTP fallback (CVE-2015-8400)
Summary: <www-misc/shellinabox-2.19: DNS rebinding attack due to HTTP fallback (CVE-20...
Status: RESOLVED FIXED
Alias: CVE-2015-8400
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa/cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-12-02 10:44 UTC by Agostino Sarubbo
Modified: 2016-01-03 19:03 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-12-02 10:44:24 UTC
From ${URL} :

Stephen Roettger from the Google Security Team reported to us that the
shellinabox package allows HTTP fallback, even when configured for HTTPS, via
the "/plain" URL.

This fallback is quite easy to be overlooked and it gives the opportunity for
a DNS rebinding attacks against systems that use the service and have default
credentials for a certain time window.

I've opened an issue on what appears to be the only maintained fork of
shellinabox at this time:

https://github.com/shellinabox/shellinabox/issues/355



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Patrice Clement gentoo-dev 2015-12-05 12:17:04 UTC
A patch is out to fix the problem:

https://github.com/shellinabox/shellinabox/commit/4aa0eb97e4c90490a9c84a0d8bd57cd22572c37a

It seems to be working as the aforementioned issue has been closed. Waiting for the author to create a new release (2.19 most likely) so that I can bump the package on the Gentoo end accordingly.
Comment 2 Patrice Clement gentoo-dev 2015-12-07 11:38:32 UTC
v2.19 is out!

https://github.com/shellinabox/shellinabox/commit/1a8010f2c94a62e7398c4fa130dfe9e099dc55cd

commit 8b0e683 (HEAD, master)
Author: Patrice Clement <monsieurp@gentoo.org>
Date:   Mon Dec 7 11:35:52 2015 +0000

    www-misc/shellinabox: Version bump. Fixes security bug 567316.
    
    Package-Manager: portage-2.2.20.1
    Signed-off-by: Patrice Clement <monsieurp@gentoo.org>

 create mode 100644 www-misc/shellinabox/shellinabox-2.19.ebuild

Arch teams,

Please stabilise:
www-misc/shellinabox-2.19

Target arches:
amd64 ppc ppc64 x86

Thank you.
Comment 3 Agostino Sarubbo gentoo-dev 2015-12-09 10:48:33 UTC
amd64 stable
Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2015-12-19 07:39:38 UTC
Stable for PPC64.
Comment 5 Patrice Clement gentoo-dev 2015-12-22 00:27:39 UTC
Stable for ppc.
Comment 6 Agostino Sarubbo gentoo-dev 2015-12-25 18:21:55 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 7 Yury German Gentoo Infrastructure gentoo-dev 2015-12-31 01:13:22 UTC
GLSA Vote: No

Maintainer(s), please drop the vulnerable version(s).
Comment 8 Patrice Clement gentoo-dev 2015-12-31 17:39:51 UTC
commit c919156 (HEAD, master)
Author: Patrice Clement <monsieurp@gentoo.org>
Date:   Thu Dec 31 17:38:02 2015 +0000

    www-misc/shellinabox: Remove vulnerable version. Fixes security bug 567316.
    
    Package-Manager: portage-2.2.20.1
    Signed-off-by: Patrice Clement <monsieurp@gentoo.org>

 delete mode 100644 www-misc/shellinabox/shellinabox-2.18.ebuild