[SECURITY ISSUES] CVE-2016-3691 and CVE-2016-3114

Andrew Shadura andrew at shadura.me
Mon May 2 17:22:30 UTC 2016


Hello everyone,

We've discovered the following security issues in Kallithea.

CVE-2016-3114: Privilege escalation
===================================

The vulnerability that allowed logged-in users to edit or
delete open pull requests associated with any repository to which
they had read access, plus a related vulnerability allowing logged-in
users to delete any comment from any repository, provided they could
determine the comment ID and had read access to just one repository.

CVE-2016-3691: CSRF protection bypass
=====================================

Routes allows GET requests to override the HTTP method, which breaks
the Kallithea CSRF protection (which only applies to POST requests).

The attacker might misuse GET requests method overriding to trick user
into issuing a request with a different method, thus bypassing the
CSRF protection.

Resolution
==========

Søren Løvborg wrote patches fixing these issues, both of which are
included in the release 0.3.2. Users are advised to upgrade as soon as
possible.

-- 
Cheers,
  Andrew

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: OpenPGP digital signature
URL: <http://lists.sfconservancy.org/pipermail/kallithea-general/attachments/20160502/540f2bb4/attachment.sig>


More information about the kallithea-general mailing list