-
Notifications
You must be signed in to change notification settings - Fork 100
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CVE-2020-29668] Unauthorised full access via SOAP API due to illegal cookie #1041
Comments
Hi @balert , could you please show what you did, such as detailed commands you executed? |
we sent a SOAP request like this:
|
If that is true it would be a big hole. I'm going to try to reproduce it. |
I can confirm the problem. You need to know the listname and the email that is allowed to see the subscribers (e.g. the owner of the list. Reproduce that with the client test script:
|
Properly check email and session id in authenticateAndRun SOAP call (#1041)
This issue has been assigned CVE-2020-29668. |
- fix SOAP interface vulnerability sympa-community/sympa#1041 PR: 252464 Submitted by: geoffroy desvernay <dgeo@centrale-marseille.fr> (maintainer) MFH: 2021Q1 Relnotes: https://github.com/sympa-community/sympa/releases/tag/6.2.60 Security: CVE-2020-29668 git-svn-id: svn+ssh://svn.freebsd.org/ports/head@560539 35697150-7ecd-e111-bb59-0022644237b5
mail/sympa: update 6.2.58 -> 6.2.60, security update CVE-2020-29668 - fix SOAP interface vulnerability sympa-community/sympa#1041 PR: 252464 Submitted by: geoffroy desvernay <dgeo@centrale-marseille.fr> (maintainer) Relnotes: https://github.com/sympa-community/sympa/releases/tag/6.2.60 Security: CVE-2020-29668
- fix SOAP interface vulnerability sympa-community/sympa#1041 PR: 252464 Submitted by: geoffroy desvernay <dgeo@centrale-marseille.fr> (maintainer) MFH: 2021Q1 Relnotes: https://github.com/sympa-community/sympa/releases/tag/6.2.60 Security: CVE-2020-29668
- fix SOAP interface vulnerability sympa-community/sympa#1041 PR: 252464 Submitted by: geoffroy desvernay <dgeo@centrale-marseille.fr> (maintainer) MFH: 2021Q1 Relnotes: https://github.com/sympa-community/sympa/releases/tag/6.2.60 Security: CVE-2020-29668 git-svn-id: svn+ssh://svn.freebsd.org/ports/head@560539 35697150-7ecd-e111-bb59-0022644237b5
mail/sympa: update 6.2.58 -> 6.2.60, security update CVE-2020-29668 - fix SOAP interface vulnerability sympa-community/sympa#1041 PR: 252464 Submitted by: geoffroy desvernay <dgeo@centrale-marseille.fr> (maintainer) Relnotes: https://github.com/sympa-community/sympa/releases/tag/6.2.60 Security: CVE-2020-29668
Version
v6.2.56-1.el7 on Centos 7.8.2003
Installation method
Centos package
Expected behavior
permission denied
Actual behavior
error message and action actually executed anyways.
Additional information
In our setup we have a problem with incorrect cookies via the SOAP API of sympa.
If the SOAP request contains a correct cookie everything works as expected -> request executed
If the SOAP request contains a correct but outdated cookie, everything works as expected -> request correctly denied.
If the SOAP request contains an arbitrary string as cookie (e.g. "asdkjasdljkahsdlkjh"), SOAP replies with an error ("Undefined session ID in cookie") but STILL executes every requests we make. By this we can add email adresses to lists without authentication, any operation we tried was still successful.
We could hotfix the problem by inserting a die(); command into /usr/share/sympa/lib/Sympa/WWW/Session.pm:129 like this:
The text was updated successfully, but these errors were encountered: