*Hi All, *
*
*
*Ben Murphy has notified us of a vulnerability[1] that can be executed
against Riak's HTTP API. Basho immediately assigned Engineers to work with
the reporter to both verify the vulnerability and to identify a patch.  We
have confirmed that this vulnerability affects all versions of Riak.

We are releasing both a security patch (for Riak versions 1.0.3 and 1.1.2)
and a full 1.1.4 security release.  We advise all users of Riak to either
apply the appropriate patch or upgrade to 1.1.4.  If you are running a
version of Riak other than 1.0.3 or 1.1.2, it will be necessary to upgrade
to 1.1.4.

Vulnerability Details

The attack is launched through a malicious website. The attack against this
vulnerability requires that the attacker have knowledge of both the IP
address (or hostname) and the port that the target Riak node is running on.
 The attack requires that the machine which visits the malicious website
has access to the Riak node, either locally or via a networked connection.
The most obvious targets for this attack would be developer installs
running default configurations.  It does not require that the target Riak
node is exposed to the Internet.

This vulnerability can result in keys being overwritten, data being
uploaded to the target's Riak node, or other malicious behavior.

Production installations that are behind a firewall and only accessible via
your application are not vulnerable.

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2012-3586 to this issue. This is a candidate for inclusion in the
CVE list (http://cve.mitre.org), which standardizes names for security
problems.

Additional information about the exploit will be released in the next few
weeks.

Mitigation

There are three ways to secure your Riak node from this exploit.

1. Upgrade to Riak 1.1.4, a security release
2. Apply a patch to a source build of Riak 1.0.3 or 1.1.2
3. Do not use a web browser on machines with network access to a Riak
installation

How to Upgrade to 1.1.4

Riak version 1.1.4 packages and source are available here:

http://basho.com/resources/downloads/

For non-development installs we recommend that you perform a rolling
upgrade.  This process is documented here:

https://help.basho.com/entries/21397673-rolling-upgrades

For development installs, please see our regular installation guides:

https://help.basho.com/entries/21460643-installation

How to Apply the Security Patch

This patch is only for Riak versions 1.0.3 and 1.1.2.  For users of all
other version, please see the directions on how to upgrade to 1.1.4.

First, download the patch to the riak/deps/riak_kv directory:

http://s3.amazonaws.com/downloads.basho.com/riak/1.1/1.1.4/164-fix.patch

Second, in the riak/deps/riak_kv directory:

patch -p1 < fix-164.patch

Third, in the top-level riak directory:

./rebar compile

Client Library Compatibility

Users of the official Python client [2] will need to upgrade to version
1.4.1 in order to continue using MapReduce over HTTP. (There will be a
separate email about this momentarily.)

**
*
*Let us know if you have any questions. *
*
Mark and the Basho Team

[1] https://github.com/basho/riak/issues/164
[2] https://github.com/basho/riak-python-client*
*
*
*
*
*
*
*
*
*
*
_______________________________________________
riak-users mailing list
riak-users@lists.basho.com
http://lists.basho.com/mailman/listinfo/riak-users_lists.basho.com

Reply via email to