[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#893803: stretch-pu: package adminer/4.2.5-3+deb9u1



Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian.org@packages.debian.org
Usertags: pu

Dear stable release manager,

Please consider adminer (4.2.5-3+deb9u1) for stretch:
  
  adminer (4.2.5-3+deb9u1) stretch; urgency=high
  
    * CVE-2018-7667: Adminer allowed unauthenticated connections to be initiated
      to arbitrary systems and ports which coul bypass external firewalls to
      identify internal hosts and/or perform port scanning of other servers.
      (Closes: #893668)


The full diff is attached.


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-
commit f195f52274eef1cbea6c268c2b236bd299b7592c
Author: Chris Lamb <lamby@debian.org>
Date:   Thu Mar 22 11:04:48 2018 -0400

    CVE-2018-7667

diff --git a/debian/changelog b/debian/changelog
index 47403b2..8445861 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,12 @@
+adminer (4.2.5-3+deb9u1) stretch; urgency=high
+
+  * CVE-2018-7667: Adminer allowed unauthenticated connections to be initiated
+    to arbitrary systems and ports which coul bypass external firewalls to
+    identify internal hosts and/or perform port scanning of other servers.
+    (Closes: #893668)
+
+ -- Chris Lamb <lamby@debian.org>  Tue, 20 Mar 2018 22:40:06 -0400
+
 adminer (4.2.5-3) unstable; urgency=medium
 
   * Move mysql-server to default-mysql-server due to
diff --git a/debian/patches/CVE-2018-7667.patch b/debian/patches/CVE-2018-7667.patch
new file mode 100644
index 0000000..1d445a2
--- /dev/null
+++ b/debian/patches/CVE-2018-7667.patch
@@ -0,0 +1,13 @@
+--- pkg-adminer.orig/adminer/include/auth.inc.php
++++ pkg-adminer/adminer/include/auth.inc.php
+@@ -90,6 +90,10 @@ if (isset($_GET["username"])) {
+ 		page_footer("auth");
+ 		exit;
+ 	}
++	list($host, $port) = explode(":", SERVER, 2);
++	if (is_numeric($port) && $port < 1024) {
++		auth_error('Connecting to privileged ports is not allowed.');
++	}
+ 	$connection = connect();
+ }
+ if (is_string($connection) || !$adminer->login($_GET["username"], get_session("pwds"))) {
diff --git a/debian/patches/series b/debian/patches/series
new file mode 100644
index 0000000..e4d99c3
--- /dev/null
+++ b/debian/patches/series
@@ -0,0 +1 @@
+CVE-2018-7667.patch

Reply to: