Document the security fix soon to be released in 3.20170111

master
Simon McVittie 2017-01-11 18:16:42 +00:00
parent 2486d83706
commit 4d0e525e6a
2 changed files with 31 additions and 2 deletions

13
debian/changelog vendored
View File

@ -1,3 +1,16 @@
ikiwiki (3.20170111) UNRELEASED; urgency=medium
* passwordauth: prevent authentication bypass via multiple name
parameters (CVE-2017-0356, OVE-20170111-0001)
* passwordauth: avoid userinfo forgery via repeated email parameter
(also in the scope of CVE-2017-0356)
* CGI, attachment, passwordauth: harden against repeated parameters
(not believed to have been a vulnerability)
* remove: make it clearer that repeated page parameter is OK here
* t/passwordauth.t: new automated test for passwordauth
-- Simon McVittie <smcv@debian.org> Wed, 11 Jan 2017 18:12:05 +0000
ikiwiki (3.20170110) unstable; urgency=medium
[ Amitai Schleier ]

View File

@ -591,7 +591,23 @@ of them relatively minor:
could potentially forge commit authorship (attribute their edit to
someone else) by crafting multiple values for the rcsinfo field
This was fixed in ikiwiki 3.20161229. A backport to Debian 8
'jessie' is in progress.
This was fixed in ikiwiki 3.20161229, with fixes backported to Debian 8
in version 3.20141016.4.
([[!debcve CVE-2016-9646]]/OVE-20161226-0001)
## <span id="cve-2017-0356">Authentication bypass via repeated parameters</span>
The ikiwiki maintainers discovered further flaws similar 2016-9646
in the passwordauth plugin's use of CGI::FormBuilder, with a more
serious impact:
* An attacker who can log in to a site with a password can log in
as a different and potentially more privileged user.
* An attacker who can create a new account can set arbitrary fields
in the user database for that account.
This was fixed in ikiwiki 3.20170111, with fixes backported to Debian 8
in version 3.20141016.4.
([[!debcve CVE-2017-0356]]/OVE-20170111-0001)