1.4.21 update does *not* fix the CSRF hole! 1.4.21 update does *not* fix the CSRF hole!
 

News:

CPG Release 1.6.26
Correct PHP8.2 issues with user and language managers.
Additional fixes for PHP 8.2
Correct PHP8 error with SMF 2.0 bridge.
Correct IPTC supplimental category parsing.
Download and info HERE

Main Menu

1.4.21 update does *not* fix the CSRF hole!

Started by Mreimer, March 18, 2009, 05:20:52 PM

Previous topic - Next topic

0 Members and 2 Guests are viewing this topic.

Mreimer

Hello,

I'm searching for a gallery application to host a photo gallery for a open source project. The first thing, I look at, are the last few security patches, and so I came to your 1.4.21 update and the linked exploit.

You call the issue to be "serious", but the fix doesn't really fix the hole. In fact, you keep the hole open and just make it impossible to exploit it using the exploit, someone posted to milw0rm. It's trivial to do bad things with just a minimal change in the way, the hole gets exploited:

- The bad image URL could be placed into a HTML mail and sent to the admin.
- The bad image URL could be posted to some other web application, owned by the same admin (forum, blog, ...)

Just to clarify the issue with CSRF holes: The problem is *not*, that it's possible to place URLs or Images to a coppermine gallery. Those links or images could also be placed to somewhere else, where the chance, the admin visits them, is high. The problem is, that it's possible to do bad things, just by tricking the admin to visit URLs. This should be impossible. To get to the wikipedia link, you also have in your advisory: http://en.wikipedia.org/wiki/Cross-site_request_forgery#Prevention

I planned to use coppermine, as it seems to fit best for my needs, but if I see how you "fixed" (or not fixed) this hole, I'm getting unsure if this is a good idea. Did you know, that your fix doesn't close the hole? If so, why didn't you publish a real fix?

Nibbler

The real fix is too major for a point release. It will be in the next major release.

Joachim Müller

We understand how the exploit works. As Nibbler pointed out: a real fix would mean that the way forms work in coppermine need to be made more secure. We have discussed this already both openly in other threads as well as privately among the devs (dev-only board). We're aware that the fix in cpg1.4.21 doesn't cure the initial vulnerability, but only doctors the symptoms. The likelihood of an attack decreases dramatically if it relies on a cross-media attack. Most email clients block images in emails, so it's less likely that an attack with a made-up HTML email will suceed. That's all we could do as a quick fix. In the long run, we'll close the vulnerability.

Quote from: Mreimer on March 18, 2009, 05:20:52 PM
I planned to use coppermine, as it seems to fit best for my needs, but if I see how you "fixed" (or not fixed) this hole, I'm getting unsure if this is a good idea. Did you know, that your fix doesn't close the hole? If so, why didn't you publish a real fix?
Sounds very confrontational to me. Yes, we know. We haven't published a "real fix" because that takes time to come up with the fix, implement it, test it, package and release it. We're only human, and we do that in our spare time. Given that the exploit was published on milwOrm on 2009-02-26, we learned about it on 2009-02-27 and released cpg1.4.21 on 2009-03-04 that was pretty fast. If you think that you can do this any faster or if you have a working permanent fix, we're all ears. However, if you can not contribute, I suggest to review your attitude a bit.

Joachim