Acknowledgement sent
to Moritz Muehlenhoff <jmm@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Fabio Tranchitella <kobold@debian.org>.
(Sat, 23 Jun 2018 08:48:04 GMT) (full text, mbox, link).
Marked as found in versions phpldapadmin/1.2.2-1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org.
(Sat, 23 Jun 2018 09:54:09 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Fabio Tranchitella <kobold@debian.org>: Bug#902186; Package phpldapadmin.
(Mon, 08 Oct 2018 18:57:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Dominik George <natureshadow@debian.org>:
Extra info received and forwarded to list. Copy sent to Fabio Tranchitella <kobold@debian.org>.
(Mon, 08 Oct 2018 18:57:05 GMT) (full text, mbox, link).
Cc: Debian Bug Tracking System <902186@bugs.debian.org>
Subject: Re: CVE-2018-12689
Date: Mon, 8 Oct 2018 20:55:35 +0200
Control: tags -1 + moreinfo
Control: severity -1 important
Heisann,
On Sat, Jun 23, 2018 at 10:45:39AM +0200, Moritz Muehlenhoff wrote:
> Package: phpldapadmin
> Severity: grave
> Tags: security
>
> Please see
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12689
I am triaging this bug report because of a request of a user to get
phpLDAPAdmin into testing again, and the maintainer seems to be unresponsive.
Doing so, I found that in my opinion, the CVE is invalid. Neither of the PoC
works.
PoC 1 (server_id parameter) does not work because the parameter is verified
using is_numeric before being passed on to anything special.
PoC 2 makes phpLDAPAdmin simply display "Invalid DN syntax for user".
No matter what, I was not able to get anything out of phpLDAPAdmin with the
information in the CVE and the refereces exploit. Thus, I am lowering the
priority of this bug report to important and asking you to provide more
information on how to produce the behaviour claimed in the CVE report.
Ha det bra,
Nik
Added tag(s) moreinfo.
Request was from Dominik George <natureshadow@debian.org>
to 902186-submit@bugs.debian.org.
(Mon, 08 Oct 2018 18:57:05 GMT) (full text, mbox, link).
Severity set to 'important' from 'grave'
Request was from Dominik George <natureshadow@debian.org>
to 902186-submit@bugs.debian.org.
(Mon, 08 Oct 2018 18:57:05 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Fabio Tranchitella <kobold@debian.org>: Bug#902186; Package phpldapadmin.
(Mon, 08 Oct 2018 20:39:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Moritz Mühlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Fabio Tranchitella <kobold@debian.org>.
(Mon, 08 Oct 2018 20:39:03 GMT) (full text, mbox, link).
Cc: Debian Bug Tracking System <902186@bugs.debian.org>
Subject: Re: CVE-2018-12689
Date: Mon, 8 Oct 2018 22:35:25 +0200
On Mon, Oct 08, 2018 at 08:55:35PM +0200, Dominik George wrote:
> Control: tags -1 + moreinfo
> Control: severity -1 important
>
> Heisann,
>
> On Sat, Jun 23, 2018 at 10:45:39AM +0200, Moritz Muehlenhoff wrote:
> > Package: phpldapadmin
> > Severity: grave
> > Tags: security
> >
> > Please see
> > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12689
>
> I am triaging this bug report because of a request of a user to get
> phpLDAPAdmin into testing again, and the maintainer seems to be unresponsive.
>
> Doing so, I found that in my opinion, the CVE is invalid. Neither of the PoC
> works.
>
> PoC 1 (server_id parameter) does not work because the parameter is verified
> using is_numeric before being passed on to anything special.
>
> PoC 2 makes phpLDAPAdmin simply display "Invalid DN syntax for user".
>
> No matter what, I was not able to get anything out of phpLDAPAdmin with the
> information in the CVE and the refereces exploit. Thus, I am lowering the
> priority of this bug report to important and asking you to provide more
> information on how to produce the behaviour claimed in the CVE report.
We're just filing these bugs as they come in from MITRE, I don't even
use phpldapadmin and most probably never will.
I suggest you report this upstream and if they agree that it's confirmed to
be a non-issue, ask for a rejection via https://cveform.mitre.org/.
Cheers,
Moritz
Reply sent
to Antoine Beaupre <anarcat@debian.org>:
You have taken responsibility.
(Wed, 31 Oct 2018 17:21:03 GMT) (full text, mbox, link).
Notification sent
to Moritz Muehlenhoff <jmm@debian.org>:
Bug acknowledged by developer.
(Wed, 31 Oct 2018 17:21:03 GMT) (full text, mbox, link).
Hi,
[Adding original security researcher in CC.]
On Mon, Oct 08, 2018 at 08:55:35PM +0200, Dominik George wrote:
> Heisann,
>
> On Sat, Jun 23, 2018 at 10:45:39AM +0200, Moritz Muehlenhoff wrote:
> > Package: phpldapadmin
> > Severity: grave
> > Tags: security
> >
> > Please see
> > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12689
>
> I am triaging this bug report because of a request of a user to get
> phpLDAPAdmin into testing again, and the maintainer seems to be unresponsive.
>
> Doing so, I found that in my opinion, the CVE is invalid. Neither of the PoC
> works.
>
> PoC 1 (server_id parameter) does not work because the parameter is verified
> using is_numeric before being passed on to anything special.
>
> PoC 2 makes phpLDAPAdmin simply display "Invalid DN syntax for user".
>
> No matter what, I was not able to get anything out of phpLDAPAdmin with the
> information in the CVE and the refereces exploit. Thus, I am lowering the
> priority of this bug report to important and asking you to provide more
> information on how to produce the behaviour claimed in the CVE report.
I can confirm that the issue is unreproducible in Debian jessie, with
package version 1.2.2. I have verified the code and I confirm that the
parameter is indeed checked.
1. Config->getServer($index) calls
2. Datastore->Instance($index) which does:
# If no index defined, then pick the lowest one.
if (is_null($index) || ! trim($index) || ! is_numeric($index))
$index = min($this->GetServerList())->getIndex();
3. Datastore->getIndex() returns the internally managed $index paramter
which is incremented when a new server is added to the datastore, in
Datastore->newServer()
I doubt there's any real security vulnerability here and will proceed to
get this rejected with Mitre, as advised. I will also update the
security tracker as appropriate.
M. Dusunur, if you disagree with this analysis, please provide more
solid evidence to back your claims that the vulnerability exists in PHP
LDAP admin.
A.
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.