From b2eb73ccfe48a5f3cabfe3614ab068da445fd89d Mon Sep 17 00:00:00 2001 From: Brian May Date: Mon, 18 Mar 2019 19:45:34 +1100 Subject: DLA-1716-1 advisory --- english/lts/security/2019/dla-1716.data | 10 +++++ english/lts/security/2019/dla-1716.wml | 65 +++++++++++++++++++++++++++++++++ 2 files changed, 75 insertions(+) create mode 100644 english/lts/security/2019/dla-1716.data create mode 100644 english/lts/security/2019/dla-1716.wml diff --git a/english/lts/security/2019/dla-1716.data b/english/lts/security/2019/dla-1716.data new file mode 100644 index 00000000000..b73622daadb --- /dev/null +++ b/english/lts/security/2019/dla-1716.data @@ -0,0 +1,10 @@ +DLA-1716-1 ikiwiki +2019-03-18 +CVE-2019-9187 +ikiwiki +yes +yes +no + +#use wml::debian::security + diff --git a/english/lts/security/2019/dla-1716.wml b/english/lts/security/2019/dla-1716.wml new file mode 100644 index 00000000000..13606bf1782 --- /dev/null +++ b/english/lts/security/2019/dla-1716.wml @@ -0,0 +1,65 @@ +LTS security update + +

The ikiwiki maintainers discovered that the aggregate plugin did not use +LWPx::ParanoidAgent. On sites where the aggregate plugin is enabled, authorized +wiki editors could tell ikiwiki to fetch potentially undesired URIs even if +LWPx::ParanoidAgent was installed:

+ +

local files via file: URIs + other URI schemes that might be misused by attackers, such as gopher: + hosts that resolve to loopback IP addresses (127.x.x.x) + hosts that resolve to RFC 1918 IP addresses (192.168.x.x etc.)

+ +

This could be used by an attacker to publish information that should not have +been accessible, cause denial of service by requesting tarpit URIs that are +slow to respond, or cause undesired side-effects if local web servers implement +unsafe GET requests. (CVE-2019-9187)

+ +

Additionally, if liblwpx-paranoidagent-perl is not installed, the +blogspam, openid and pinger plugins would fall back to LWP, which is +susceptible to similar attacks. This is unlikely to be a practical problem for +the blogspam plugin because the URL it requests is under the control of the +wiki administrator, but the openid plugin can request URLs controlled by +unauthenticated remote users, and the pinger plugin can request URLs controlled +by authorized wiki editors.

+ +

This is addressed in ikiwiki 3.20190228 as follows, with the same fixes +backported to Debian 9 in version 3.20170111.1:

+ + + +

For Debian 8 Jessie, this problem has been fixed in version +3.20141016.4+deb8u1.

+ +

We recommend that you upgrade your ikiwiki packages. In addition it is also +recommended that you have liblwpx-paranoidagent-perl installed, which listed in +the recommends field of ikiwiki.

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2019/dla-1716.data" +# $Id: $ -- cgit v1.2.3