Author: jfthomps
Date: Mon Jul 29 15:20:23 2019
New Revision: 1863947
URL: http://svn.apache.org/viewvc?rev=1863947&view=rev
Log:
initial creation of security page
Added:
vcl/site/trunk/content/security.mdtext (with props)
Added: vcl/site/trunk/content/security.mdtext
URL:
http://svn.apache.org/viewvc/vcl/site/trunk/content/security.mdtext?rev=1863947&view=auto
==============================================================================
--- vcl/site/trunk/content/security.mdtext (added)
+++ vcl/site/trunk/content/security.mdtext Mon Jul 29 15:20:23 2019
@@ -0,0 +1,94 @@
+Title: Apache VCL Security
+Notice: Licensed to the Apache Software Foundation (ASF) under one
+ or more contributor license agreements. See the NOTICE file
+ distributed with this work for additional information
+ regarding copyright ownership. The ASF licenses this file
+ to you under the Apache License, Version 2.0 (the
+ "License"); you may not use this file except in compliance
+ with the License. You may obtain a copy of the License at
+ .
+ http://www.apache.org/licenses/LICENSE-2.0
+ .
+ Unless required by applicable law or agreed to in writing,
+ software distributed under the License is distributed on an
+ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ KIND, either express or implied. See the License for the
+ specific language governing permissions and limitations
+ under the License.
+
+#h1 Security Issues
+The Apache Software Foundation takes security issues seriously and has a
+[security team](https://www.apache.org/security/) that helps Apache projects
work through security
+issues. If you discover any potential vulnerabilities in Apache VCL, please
report them to
+[[email protected]](mailto:[email protected]).
+
+#h2 Known Security Issues
+Here is a list of known security issues with Apache VCL along with the
versions affected, versions
+in which they were fixed, and information on patching vulnerable versions.
+
+#h3 CVE-2018-11772
+* Announced: July 29th, 2019
+* Affected versions: versions 2.1 through 2.5
+* Fixed in version: 2.5.1
+* [Installing patches](/patches/patching-CVE-2018.html)
+* Problem type: SQL injection
+* Description:
+
+ Apache VCL versions 2.1 through 2.5 do not properly validate cookie input
when determining what
+ node (if any) was previously selected in the privilege tree. The cookie
data is then used in an
+ SQL statement. This allows for an SQL injection attack. Access to this
portion of a VCL system
+ requires admin level rights. Other layers of security seem to protect
against malicious attack.
+ However, all VCL systems running versions earlier than 2.5.1 should be
upgraded or patched.
+ This vulnerability was found and reported to the Apache VCL project by
ADLab of Venustech.
+
+#h3 CVE-2018-11773
+* Announced: July 29th, 2019
+* Affected versions: versions 2.1 through 2.5
+* Fixed in version: 2.5.1
+* [Installing patches](/patches/patching-CVE-2018.html)
+* Problem type: improper form validation
+* Description:
+
+ Apache VCL versions 2.1 through 2.5 do not properly validate form input
when processing a
+ submitted block allocation. The form data is then used as an argument to
the php built in
+ function strtotime. This allows for an attack against the underlying
implementation of that
+ function. The implementation of strtotime at the time the issue was
discovered appeared to be
+ resistant to a malicious attack. However, all VCL systems running versions
earlier than 2.5.1
+ should be upgraded or patched. This vulnerability was found and reported
to the Apache VCL
+ project by ADLab of Venustech.
+
+#h3 CVE-2018-11774
+* Announced: July 29th, 2019
+* Affected versions: versions 2.1 through 2.5
+* Fixed in version: 2.5.1
+* [Installing patches](/patches/patching-CVE-2018.html)
+* Problem type: SQL Injection
+* Description:
+
+ Apache VCL versions 2.1 through 2.5 do not properly validate form input
when adding and
+ removing VMs to and from hosts. The form data is then used in SQL
statements. This allows for
+ an SQL injection attack. Access to this portion of a VCL system requires
admin level rights.
+ Other layers of security seem to protect against malicious attack.
However, all VCL systems
+ running versions earlier than 2.5.1 should be upgraded or patched. This
vulnerability was
+ found and reported to the Apache VCL project by ADLab of Venustech.
+
+#h3 CVE-2013-0267
+* Announced: May 6th, 2013
+* Affected versions: versions 2.1, 2.2, 2.2.1, 2.3, 2.3.1
+* Fixed in version: 2.2.2, 2.3.2
+* Problem type: improper input validation
+* Description:
+
+ Some parts of VCL did not properly validate input data. This problem was
present both in the
+ Privileges portion of the web GUI and in the XMLRPC API.
+
+ A malicious user having a minimal level of administrative rights could
+ manipulate the data submitted by the web GUI or submit non-standard data
to
+ the API to gain additional administrative rights.
+
+ The API functions that are vulnerable were introduced in 2.3.1. Some of
those
+ API functions can also be exploited to perform a DOS attack on the site to
+ remove access from other users and to perform an XSS attack to gain
elevated
+ privileges.
+
+ The vulnerabilities were found by an Apache VCL developer doing a code
review.
\ No newline at end of file
Propchange: vcl/site/trunk/content/security.mdtext
------------------------------------------------------------------------------
svn:eol-style = native