Cantata, a client for Music Player Daemon, was found to have a security flaw, where it allows attacker to download any readable file on the system. It starts internal http server on external network interface by default, and it's not possible to disable http server, it was found that cantata checks for two things: 1. User-Agent in http/httpsocket.cpp: if (str.startsWith("User-Agent:") && str.contains("Music Player Daemon")) { return true; } 2. 'cantata=song' in url in http/httpserver.cpp: if (q.hasQueryItem("cantata") && q.queryItemValue("cantata")=="song") So, anyone can craft a simple command based on these two criterias and can download any file targeted, which cantata allows. References: https://bugs.gentoo.org/show_bug.cgi?id=495182
Created cantata tracking bugs for this issue: Affects: fedora-all [bug 1046306]
Also note the upstream bug that was also filed: https://code.google.com/p/cantata/issues/detail?id=356 As well, the default firewall rules would prevent external users from accessing this web server unless the user explicitly allowed it or turned the firewall off. There is currently no patch available.
cantata-1.2.2-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
cantata-1.2.2-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
CVE Request: http://seclists.org/oss-sec/2014/q1/121
You can close this now.