Christopher showed: [1] http://archives.neohapsis.com/archives/bugtraq/2010-03/0156.html a deficiency in the way, Sahana disaster management system performed user authentication. Visiting a certain URL would allow an attacker to view (and potentially modify) information, which should be otherwise protected by authentication. Upstream bug report: [2] http://sourceforge.net/tracker/?func=detail&aid=2970786&group_id=127855&atid=709778 References: [3] http://archives.neohapsis.com/archives/bugtraq/2010-03/0156.html [4] http://secunia.com/advisories/39020/ Affected versions: Issue reported against v0.6.2.2. Other versions may be also affected. Credit: Christopher CVE Request: [5] http://www.openwall.com/lists/oss-security/2010/03/19/1
Sample URLs (from [1]): http://victim/<sahana_path>/index.php?mod=admin&act=acl_enable_acl Authenticates correctly. http://victim/<sahana_path>/stream.php?mod=admin&act=acl_enable_acl Does not.
This issue affects the versions of the sahana package, as shipped with Fedora release of 11 and 12. This issue affects the versions of the sahana package, as shipped within EPEL5 repository. Please fix once upstream patch available (see [2] for progress on this).
This is CVE-2010-1191.
sahana-0.6.3-1.el5 has been submitted as an update for Fedora EPEL 5. http://admin.fedoraproject.org/updates/sahana-0.6.3-1.el5
sahana-0.6.3-1.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/sahana-0.6.3-1.fc12
sahana-0.6.3-1.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
sahana-0.6.3-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.