This is a security advisory for TWiki installations: Unauthorized users may view access restricted content with a failed login. This applies only to TWiki installations with sessions enabled using Apache 1.3, not Apache 2.x. * Vulnerable Software Version * Attack Vectors * Impact * Severity Level * MITRE Name for this Vulnerability * Details * Countermeasures * Hotfix * Authors and Credits * Action Plan with Timeline * Feedback * External Links ---++ Vulnerable Software Version * TWikiRelease04x00x05 -- TWiki-4.0.5.zip * TWikiRelease04x00x04 -- TWiki-4.0.4.zip * TWikiRelease04x00x03 -- TWiki-4.0.3.zip * TWikiRelease04x00x02 -- TWiki-4.0.2.zip * TWikiRelease04x00x01 -- TWiki-4.0.1.zip * TWikiRelease04x00x00 -- TWiki-4.0.0.zip * TWikiRelease04Sep2004 -- TWiki20040904.zip (1) * TWikiRelease03Sep2004 -- TWiki20040903.zip (1) * TWikiRelease02Sep2004 -- TWiki20040902.zip (1) * TWikiRelease01Sep2004 -- TWiki20040901.zip (1) (1) - with SessionPlugin ---++ Attack Vectors An unauthorized user can login by cancelling out of a failed login. ---++ Impact An unauthorized user is able to view content in access restricted topics. Editing topics and attaching files is not impacted. ---++ Severity Level The TWiki SecurityTeam [2] triaged this issue as documented in TWikiSecurityAlertProcess [3] and assigned the following severity level: * Severity 3 issue: TWiki content or browser is compromised ---++ MITRE Name for this Vulnerability The Common Vulnerabilities and Exposures project has assigned the name CVE-2006-6071 [4] to this vulnerability. ---++ Details Your site may be vulnerable if: 1. If you have ErrorDocument 401 set to point to the TWikiRegistration topic (or any other TWiki topic), and 2. You are using !ApacheLogin with TWiki-4.0 and have sessions enabled, _or_ you are using an earlier TWiki version with SessionPlugin, and 3. You are running Apache 1.3 The exploit can be used to view pages protected by TWiki permissions. It does not allow you to to gain write access. You can verify if your site is vulnerable as follows: 1. Click the 'Login' link in the left bar 2. Enter the login name of a valid user, but an incorrect password. 3. Click "Ok" 4. If apache re-prompts, enter the same username and password again 5. Click "Cancel" If your site is vulnerable you will be redirected to the TWikiRegistration topic with the valid user apparently logged in (the name appears in the left bar). ---++ Countermeasures * Restrict access to the TWiki installation. * Apply the hotfix indicated below. NOTE: The hotfix is known to prevent the current attacks, but it might not be a complete fix ---++ Hotfix Delete the ErrorDocument line in the Apache configuration (httpd.conf or .htaccess), *or* (preferred) change it to point to a static HTML page. This page can safely contain a link to the TWikiRegistration page. For example, <html> <title>Failed login</title> <head> </head> <body> Your login attempt failed. <p /> Do you want to <a href="/cgi-bin/view/TWiki/TWikiRegistration">register in TWiki</a>? </body> </html> (modify the href as appropriate for your site.) ---++ Authors and Credits * Credit to TWiki:Main.GeorgeClark for disclosing the issue to the twiki-security mailing list * TWiki:Main.CrawfordCurrie for researching issue and for creating recommended fix * TWiki:Main.PeterThoeny for creating the advisory ---++ Action Plan with Timeline * 2006-11-17: User discloses vulnerability to twiki-security * 2006-11-21: Developer verifies issue * 2006-11-21: Developer creates hotfix * 2006-11-21: Security team creates advisory * 2006-11-29: Send alert to TWikiAnnounceMailingList and TWikiDevMailingList * 2006-11-30: Publish advisory in Codev web and update all related topics * 2006-11-30: Issue a public security advisory ---++ Feedback Please provide feedback at the security alert topic [1], http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2006-6071 ---++ External Links [1]: http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2006-6071 [2]: http://twiki.org/cgi-bin/view/Codev/SecurityTeam [3]: http://twiki.org/cgi-bin/view/Codev/TWikiSecurityAlertProcess [4]: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6071 -- Contributors: Main.CrawfordCurrie, Main.PeterThoeny - 30 Nov 2006 -- * Peter Thoeny Peter@private * http://StructuredWikis.com - bringing wikis to the workplace * http://TWiki.org - is your team already TWiki enabled? * Knowledge cannot be managed, it can be discovered and shared * This e-mail is: (_) private (_) ask first (x) public
This archive was generated by hypermail 2.1.3 : Sat Dec 02 2006 - 21:50:50 PST