[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[EP-tech] Antwort: EPrints Security Announcement - February 2020



CAUTION: This e-mail originated outside the University of Southampton.

Thank you David.
We applied the procedure yesterday (I use RSS on https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Ffiles.eprints.org%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855336955%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=bJe7WnjQtBJm9E6BU%2BzhdRYPZdPr3BUsRzfPx%2BRFaQ4%3D&amp;reserved=0<https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Ffiles.eprints.org%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855336955%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=bJe7WnjQtBJm9E6BU%2BzhdRYPZdPr3BUsRzfPx%2BRFaQ4%3D&amp;reserved=0>) and everything worked fine.

Kind regards,

Martin

--
Dr. Martin Br?ndle
Zentrale Informatik
Universit?t Z?rich
Stampfenbachstr. 73
CH-8006 Z?rich



[Inactive hide details for "David R Newman via Eprints-tech" ---24/02/2021 10:44:46---Hi all, EPrints Services was recently made]"David R Newman via Eprints-tech" ---24/02/2021 10:44:46---Hi all, EPrints Services was recently made aware of a small number of security

Von: "David R Newman via Eprints-tech" <eprints-tech at ecs.soton.ac.uk>
An: "eprints-tech at ecs.soton.ac.uk" <eprints-tech at ecs.soton.ac.uk>
Datum: 24/02/2021 10:44
Betreff: [EP-tech] EPrints Security Announcement - February 2020
Gesendet von: <eprints-tech-bounces at ecs.soton.ac.uk>

________________________________



Hi all,
EPrints Services was recently made aware of a small number of security vulnerabilities within the EPrints codebase, affecting both EPrints 3.4 and EPrints 3.3.
I have created two patch files to fix the vulnerabilities and uploaded them to files.eprints.org<https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Ffiles.eprints.org%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855336955%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=bJe7WnjQtBJm9E6BU%2BzhdRYPZdPr3BUsRzfPx%2BRFaQ4%3D&amp;reserved=0>.

- EPrints 3.4.2 : https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffiles.eprints.org%2F2548%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855336955%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=2J2OLOizOIcjm%2BzNd0zBKkueQJeSV%2FBrHTiigLOJldE%3D&amp;reserved=0<https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffiles.eprints.org%2F2548%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855336955%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=2J2OLOizOIcjm%2BzNd0zBKkueQJeSV%2FBrHTiigLOJldE%3D&amp;reserved=0>
- EPrints 3.3.x : https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffiles.eprints.org%2F2549%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855336955%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=l4LLarcpflo778%2FGpOIr12SNSGybJQyQOdCefJq6Fzs%3D&amp;reserved=0<https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffiles.eprints.org%2F2549%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855336955%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=l4LLarcpflo778%2FGpOIr12SNSGybJQyQOdCefJq6Fzs%3D&amp;reserved=0>

The former fixes the EPrints 3.4.2 release and the latter fixes EPrints 3.3 (based on the current HEAD of https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Feprints%2Feprints&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855346914%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=VxHW2m%2FwT53ImHU2kYV2J10bZyXpK3ca8%2BHScns%2BfU0%3D&amp;reserved=0<https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Feprints%2Feprints&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855346914%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=VxHW2m%2FwT53ImHU2kYV2J10bZyXpK3ca8%2BHScns%2BfU0%3D&amp;reserved=0>). These links also provide instructions on how to apply the patch file and some more details on the affected files.  There are references to the Common Vulnerabilities and Exposure (CVE) IDs but as of now these are yet to be published.  All the vulnerabilities identified relate to either Cross-Site Scripting (XSS) or Remote Code Execution (RCE) vulnerabilities.  All of these vulnerabilities would require analysis of the codebase to determine an exploit.  It is very unlikely that generic tools used to identify vulnerabilities would discover these, as specific knowledge is required.

I have also updated to patch these vulnerabilities on both the eprints and eprints3.4 GitHub repositories for the eprints organisation (https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Feprints&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855346914%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=aEBXrSCFPb2duUi20GD5N1CsxDa%2BvCiBlbzd%2F04ukYo%3D&amp;reserved=0<https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Feprints&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855346914%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=aEBXrSCFPb2duUi20GD5N1CsxDa%2BvCiBlbzd%2F04ukYo%3D&amp;reserved=0>).  The next release of EPrints 3.4 (3.4.3) will have these security fixes in place.

EPrints Services customers both those who EPrints Services host and those that self-host have either been patched or where this has not been possible, informed of the vulnerabilities and how they can be fixed.

If you have any follow-up questions please feel free to ask. Hopefully, the CVEs will be published shortly for those interested in more detail.  However, they were raised by a third party, who I have only just given go-ahead to make these public.

Regards

David Newman


<https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.avg.com%2Femail-signature%3Futm_medium%3Demail%26utm_source%3Dlink%26utm_campaign%3Dsig-email%26utm_content%3Demailclient&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855346914%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=YdthVnjhh%2B69eUIFw5Hr1WCgstjxz%2BhRBbw1MbOT5KI%3D&amp;reserved=0>

Virus-free. https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.avg.com%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855346914%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=gKDLo8FjOfCcYS2LmT42l4telpQPHOs4%2Baga4zPW7IU%3D&amp;reserved=0<https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.avg.com%2Femail-signature%3Futm_medium%3Demail%26utm_source%3Dlink%26utm_campaign%3Dsig-email%26utm_content%3Demailclient&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855346914%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=YdthVnjhh%2B69eUIFw5Hr1WCgstjxz%2BhRBbw1MbOT5KI%3D&amp;reserved=0>

*** Options: http://mailman.ecs.soton.ac.uk/mailman/listinfo/eprints-tech
*** Archive: https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.eprints.org%2Ftech.php%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855346914%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=PZ9LSpEk30KFSckywLabx%2B42xwi%2F4P9IN1o9ibK4Da4%3D&amp;reserved=0
*** EPrints community wiki: https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwiki.eprints.org%2F&amp;data=04%7C01%7Ceprints-tech%40ecs.soton.ac.uk%7C91b87eaabc28417ba59908d8d8ac4f20%7C4a5378f929f44d3ebe89669d03ada9d8%7C0%7C0%7C637497581855346914%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=UCv2AjuXcUoKlYhL6Diaxz0sqAGR6EkA3zxeVVeOFDo%3D&amp;reserved=0

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.ecs.soton.ac.uk/pipermail/eprints-tech/attachments/20210224/3d302c8c/attachment-0001.html 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: graycol.gif
Type: image/gif
Size: 105 bytes
Desc: not available
Url : http://mailman.ecs.soton.ac.uk/pipermail/eprints-tech/attachments/20210224/3d302c8c/attachment-0001.gif