Описание
Security update for prosody
This update for prosody to version 0.10.2 fixes the following issues:
This security issue was fixed:
- CVE-2018-10847: Prevent insufficient validation of client-provided parameters during XMPP stream restarts. Authenticated users may have overriden the realm associated with their session, potentially bypassing security policies and allowing impersonation (bsc#1094890).
These non-security issues were fixed:
- mod_websocket: Store the request object on the session for use by other modules
- mod_c2s: Avoid concatenating potential nil value
- core.certmanager: Allow all non-whitespace in service name
- mod_disco: Skip code specific to disco on user accounts
- mod_bosh: Store the normalized hostname on session
- MUC: Fix error logged when no persistent rooms present
Список пакетов
openSUSE Leap 15.0
prosody-0.10.2-lp150.3.6.2
Ссылки
- E-Mail link for openSUSE-SU-2018:1632-1
- SUSE Security Ratings
Описание
prosody before versions 0.10.2, 0.9.14 is vulnerable to an Authentication Bypass. Prosody did not verify that the virtual host associated with a user session remained the same across stream restarts. A user may authenticate to XMPP host A and migrate their authenticated session to XMPP host B of the same Prosody instance.
Затронутые продукты
openSUSE Leap 15.0:prosody-0.10.2-lp150.3.6.2
Ссылки
- CVE-2018-10847
- SUSE Bug 1094890