Hi Utkarsh, all

After reading the description of this CVE again I realize that I
misunderstood the description last time.

The problem is that the "referrer" header is not stripped.

This changes my conclusion to some extent.

I see no problem with fixing this issue from a regression point of view
(apart from what has already been expressed).
The amount of services that rely on the referrer field should be small, if
any.

I still think we can ignore it though with the same reasoing as I expressed
in the last email. The problem should be minor. There are other worse
problem by providing sensitive data in the URL.
And again if the attacker can make a redirect, the attacker can most likely
get the URL anyway so then nothing has leaked.

Cheers

// Ola



// Ola

On Wed, 7 Apr 2021 at 13:19, Ola Lundqvist <o...@inguza.com> wrote:

> Hi Utkarsh, all
>
> Is this even a vulnerability?
> The problem is that authentication information is not stripped if the
> browser is redirected to another place.
>
> If you trust a site enough to provide authentication data, I guess you
> also trust that if that site happens to be relocated you should also trust
> the new place.
> I mean if the attacker has the power to redirect I expect that it has the
> power to read the authentication data anyway. There could be cases when
> this is not the case, but in general it should not be possible for the
> attacker to redirect without also having more power.
>
> We could of course consider to apply this fix, but it certainly will cause
> a regression since my expectation is that authentication information is
> forwarded.
>
> I think it should be ignored. If we fix it, it should be with a
> configuration option, but I think that is a little too intrusive for (E)LTS.
>
> Or have I missed something?
>
> Best regards
>
> // Ola
>
> On Mon, 5 Apr 2021 at 02:20, Utkarsh Gupta <utka...@debian.org> wrote:
>
>> Hello,
>>
>> [CCing the Security team in case they have some ideas or suggestions
>> for CVE-2021-22876/curl]
>>
>> Whilst triaging and looking thoroughly for this CVE, affecting curl, I
>> noticed that the upstream patch uses elements like CURLU,
>> CURLUPART_{URL,FRAGMENT,USER,PASSWORD}. This comes from the URL API
>> which seems to be missing in both, stretch and jessie.
>>
>> There seem to be two plausible options at this point:
>>
>> 1. Given that this CVE has been assigned low severity by upstream, we
>> could perhaps mark this as no-dsa or ignored, with an appropriate
>> comment; or
>>
>> 2. Backport the entire URL API (patch for that is attached; is
>> intrusive) and then apply the fix for CVE-2021-22876 (patch attached)
>> on top of that. Whilst this option makes sense, but backporting the
>> entire URL API could have an unforeseen effect (or chances of
>> potential regressions) and in any case, looks somewhat intrusive.
>>
>> So for now, I've added curl to dla-needed and ela-needed but if we
>> decide to mark this as no-dsa or ignored, we could simply drop this
>> from there as this is the only CVE that needs working on.
>>
>> Let me know what y'all think.
>>
>>
>> - u
>>
>
>
> --
>  --- Inguza Technology AB --- MSc in Information Technology ----
> |  o...@inguza.com                    o...@debian.org            |
> |  http://inguza.com/                Mobile: +46 (0)70-332 1551 |
>  ---------------------------------------------------------------
>
>

-- 
 --- Inguza Technology AB --- MSc in Information Technology ----
|  o...@inguza.com                    o...@debian.org            |
|  http://inguza.com/                Mobile: +46 (0)70-332 1551 |
 ---------------------------------------------------------------

Reply via email to