Moritz Mühlenhoff dijo [Tue, Dec 09, 2014 at 10:17:14PM +0100]:
> > > I'm getting in touch with the authors right now. Thanks!
> > 
> > http://collabtive.o-dyn.de/forum/viewtopic.php?f=11&t=8479
> 
> Gunnar,
> is this fixed in the version in jessie?

Sorry for the delay for this reply!

I can confirm you that, from the three attacks mentioned in
exploit-db¹, attacks 1 and 3 do not work. As for attack 2 (the CSRF),
the description just reads:

    Technically, attacker can create a specially crafted page and
    force collabtive administrators to visit it and can gain
    administrative privilege. For prevention from CSRF
    vulnerabilities, application needs anti-csrf token, captcha and
    asking old password for critical actions.

The refered site for the POC exploit² no longer exists, so I cannot
confirm whether it has been fixed or not. I can see from the forum
post you linked to that the author does not believe it to be a
realistic, important enough issue to worry about.

¹ http://www.exploit-db.com/exploits/15240/
² http://www.anatoliasecurity.com/exploits/collabtive-csrf-xploit.txt

Attachment: signature.asc
Description: Digital signature

Reply via email to