[Fusionforge-general] CVE-2014-0468: vulnerability in FusionForge Apache configuration

Sylvain Beucler - Inria sylvain.beucler at inria.fr
Mon Mar 31 17:55:28 CEST 2014


Hi,

Last week we discovered a vulnerability in the Apache configuration 
shipped with FusionForge, where the web server may execute scripts that 
the users would have uploaded in their raw SCM repositories (SVN, Git, 
Bzr...).

This vulnerability, labelled CVE-2014-0468, can be exploited if you 
provide file-level access (shell access, sftp access) to the /raw/ 
repositories (direct access bypassing the svn/git/etc. commands).
Note: scripts committed normally to the repositories may not be executed 
through this vulnerability.


A fixed configuration is available at:
https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=blob;f=src/etc/httpd.conf.d/plugin-generic.inc;hb=HEAD
and reproduced below for reference.

Since the installation process usually does not override configuration 
files (because they may have been customized), make sure you update your 
installed '/etc/<forge>/httpd.conf.d/plugin-generic.inc' file manually.

An updated 5.2 release is in preparation for new installations.
(5.1 reached end of support, but the fix also applies to that version)

Regards,
The FusionForge team.

-----

ScriptAliasMatch ^/plugins/([^/]*)/cgi-bin/(.*) {core/source_path}/plugins/$1/cgi-bin/$2

Alias {core/url_prefix}anonscm/ {core/data_path}/chroot/scmrepos/

<DirectoryMatch {core/data_path}/chroot/scmrepos/[^/]*>
   Options -Indexes
</DirectoryMatch>
<DirectoryMatch {core/data_path}/chroot/scmrepos/[^/]*/.*>
   # Enable directory index listing, but disable symlinks and CGI
   Options Indexes

   # Permit HTTP Auth for somewhat private projects (mechanism
   # other than the SCM anon bit in the forge)
   AllowOverride AuthConfig

   # Prevent cookie theft in case a script does manage to execute
   RequestHeader unset Cookie

   # Disable all scripting engines (taken from Savannah)
   # except for empty filenames == directory index
   <Files "?*">
     SetHandler default
   </Files>

   # Disable PHP5 explicitly for security (CVE-2014-0468)
   <IfModule mod_php5.c>
     php_admin_flag engine off
   </IfModule>
</DirectoryMatch>

-------------- section suivante --------------
Une pi?ce jointe HTML a ?t? nettoy?e...
URL: <http://lists.fusionforge.org/pipermail/fusionforge-general/attachments/20140331/432ead16/attachment.html>


More information about the Fusionforge-general mailing list