Closed Bug 808845 (CVE-2012-5475) Opened 12 years ago Closed 12 years ago

[SECURITY] Security vulnerability in YUI's swfstore.swf in YUI 2.8.2 and 2.9.0

Categories

(Bugzilla :: Bugzilla-General, defect)

3.7.1
defect
Not set
critical

Tracking

()

RESOLVED FIXED
Bugzilla 4.0

People

(Reporter: LpSolit, Assigned: LpSolit)

References

()

Details

Attachments

(2 files, 1 obsolete file)

Bugzilla 3.6 has no SWF files in js/yui/ and so is not affected by the vulnerability described here. Bugzilla 4.0 and newer all have: md5sum ./swfstore/swfstore.swf 8526b66bd23fe8cebfa3426ad9c74ff0 This is the md5sum of swfstore.swf being released with YUI 2.8.0 - 2.8.2 (bug 606618). Per http://yuilibrary.com/support/20121030-vulnerability/, this SWF file is affected. Bugzilla 4.2 and newer were supposed to be fully upgraded to YUI 2.9.0 (bug 649879) which is not affected by this issue, and which has the following checksum: md5sum ./swfstore/swfstore.swf 844a3718c5f8c04ece6a86065a658a07 But this file has not been included in the list of updated files in bug 649879, and so we are still storing the file from YUI 2.8.x instead of the new one from YUI 2.9.0. Consequently, we are vulnerable to CVE-2012-5475. :( Attached is the patched swfstore.swf file for YUI 2.8.2 (Bugzilla 4.0): md5sum swfstore.swf 0114ab8c878ac4e48fd110f32164258b
Flags: blocking4.4+
Flags: blocking4.2.4+
Flags: blocking4.0.9+
And here is the SWF file for YUI 2.9.0 which was originally supposed to be uploaded in bug 649879 (Bugzilla 4.2 and newer).
Flags: approval?
Flags: approval4.4?
Flags: approval4.2?
Flags: approval4.0?
(In reply to Frédéric Buclin from comment #0) > Bugzilla 4.2 and newer were supposed to be fully upgraded to YUI > 2.9.0 (bug 649879) which is not affected by this issue, and which has the > following checksum: > > md5sum ./swfstore/swfstore.swf 844a3718c5f8c04ece6a86065a658a07 Is that true? The updated announcement says 2.9.0 and that checksum are vulnerable according to their table, and says the 2.9.0 patch is "Coming Soon" http://yuilibrary.com/support/20121030-vulnerability/#dropins > Attached is the patched swfstore.swf file for YUI 2.8.2 (Bugzilla 4.0): > > md5sum swfstore.swf 0114ab8c878ac4e48fd110f32164258b That is the checksum listed as the fix for the 2.8.2 version, don't know why that isn't also the fix for the 2.9.0 version.
What do we use those for, I don't think I've ever run across flash on BMO. If we don't use it can we simply delete it? Do we have the affected charts.swf and/or uploader.swf as well?
(In reply to Daniel Veditz [:dveditz] from comment #3) > What do we use those for, I don't think I've ever run across flash on BMO. > If we don't use it can we simply delete it? no, because it's possible for extensions to use this file. > Do we have the affected charts.swf and/or uploader.swf as well? no.
(In reply to Byron Jones ‹:glob› from comment #4) > (In reply to Daniel Veditz [:dveditz] from comment #3) > > What do we use those for, I don't think I've ever run across flash on BMO. > > If we don't use it can we simply delete it? > > no, because it's possible for extensions to use this file. Just because extensions may use it doesn't mean we need it on BMO. We should remove it, as it's already been the cause of security problems before.
(In reply to Reed Loden [:reed] from comment #5) > Just because extensions may use it doesn't mean we need it on BMO. We should > remove it, as it's already been the cause of security problems before. this bug is isn't about bmo. what are thoughts on updating the .swf, but also adding an explicit entry to .htaccess to block all of yui's .swf files? sites which have installed an extension can remove the block, while other sites gain protection against any further issues.
(In reply to Daniel Veditz [:dveditz] from comment #2) > Is that true? The updated announcement says 2.9.0 and that checksum are > vulnerable according to their table, and says the 2.9.0 patch is "Coming > Soon" That was true when I wrote that comment. Meanwhile, I emailed the YUI team to notify them that they said that swfstore.swf was only vulnerable in YUI 2.8.0 and 2.8.1, but not in 2.8.2. But YUI 2.8.2 has the same file as previous 2.8.x releases. So they investigated, and they replied that 2.8.2 and 2.9.0 were indeed also affected. So the support page has been updated during the night, after I posted my comment. So we will indeed also need a patched SWF file for 2.9.0. I will attach it here once it's available. (In reply to Byron Jones ‹:glob› from comment #4) > > If we don't use it can we simply delete it? > > no, because it's possible for extensions to use this file. I think that was a bad decision, but it seems I was the only one to complain when these SWF files have been added to the bugzilla repo. There is no reason to only include two of the four SWF files from YUI. I think there is no rationale behind this. Also, we usually never include stuff which we don't use in the core code, but these two SWF files have been added anyway. AFAIK, YUI3 no longer uses these SWF files, so this is another good reason to leave YUI2 asap.
Here is the patched swfstore.swf file for YUI 2.9.0: md5sum swfstore-290.swf 42af62409ff28a1880f5e77697af5b2e
Attachment #678541 - Attachment is obsolete: true
Summary: [SECURITY] Security vulnerability in YUI's swfstore.swf in YUI 2.8.2 → [SECURITY] Security vulnerability in YUI's swfstore.swf in YUI 2.8.2 and 2.9.0
Flags: approval?
Flags: approval4.4?
Flags: approval4.4+
Flags: approval4.2?
Flags: approval4.2+
Flags: approval4.0?
Flags: approval4.0+
Flags: approval+
Committing to: bzr+ssh://lpsolit%40gmail.com@bzr.mozilla.org/bugzilla/trunk/ modified js/yui/swfstore/swfstore.swf Committed revision 8469. Committing to: bzr+ssh://lpsolit%40gmail.com@bzr.mozilla.org/bugzilla/4.4/ modified js/yui/swfstore/swfstore.swf Committed revision 8454. Committing to: bzr+ssh://lpsolit%40gmail.com@bzr.mozilla.org/bugzilla/4.2/ modified js/yui/swfstore/swfstore.swf Committed revision 8168. Committing to: bzr+ssh://lpsolit%40gmail.com@bzr.mozilla.org/bugzilla/4.0/ modified js/yui/swfstore/swfstore.swf Committed revision 7734.
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Depends on: 572949
Version: 4.0.8 → 3.7.1
Security advisory sent. Removing the security flag.
Group: bugzilla-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: