Bug 1775177 (CVE-2019-18928) - CVE-2019-18928 cyrus-imapd: privilege escalation in HTTP request
Summary: CVE-2019-18928 cyrus-imapd: privilege escalation in HTTP request
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-18928
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1775179 1781641
Blocks: 1775178
TreeView+ depends on / blocked
 
Reported: 2019-11-21 14:26 UTC by Dhananjay Arunesh
Modified: 2021-02-16 21:00 UTC (History)
6 users (show)

Fixed In Version: cyrus-imap 2.5.14, cyrus-imap 3.0.12
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-11-04 02:23:29 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:4655 0 None None None 2020-11-04 02:42:59 UTC

Description Dhananjay Arunesh 2019-11-21 14:26:34 UTC
A vulnerability was found in Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection.

Reference:
https://www.cyrusimap.org/imap/download/release-notes/2.5/x/2.5.14.html
https://www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.12.html

Comment 1 Dhananjay Arunesh 2019-11-21 14:27:14 UTC
Created cyrus-imapd tracking bugs for this issue:

Affects: fedora-all [bug 1775179]

Comment 2 Stefan Cornelius 2019-11-22 11:09:20 UTC
External References:

https://github.com/cyrusimap/cyrus-imapd/issues/2904

Comment 3 Stefan Cornelius 2019-12-10 10:54:54 UTC
Statement:

If HTTP is enabled (e.g. RSS, CalDAV), cyrus-imapd does not properly authenticate a HTTP request coming through a connection that has been previously authenticated. Usually, this is not a problem, as each user will have their own connection and a breach of security boundaries would not be possible. An exception to this rule is if the cyrus-imapd HTTP service is behind a proxy, for example a reverse caching proxy, and said proxy reuses the same connection to cyrus-imapd for multiple requests.

Comment 6 Product Security DevOps Team 2020-11-04 02:23:29 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-18928

Comment 7 errata-xmlrpc 2020-11-04 02:42:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4655 https://access.redhat.com/errata/RHSA-2020:4655


Note You need to log in before you can comment on or make changes to this bug.