Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title ShareLaTeX vulnerable to remote command execution and information disclosure
Informations
Name VU#302668 First vendor Publication 2015-03-03
Vendor VU-CERT Last vendor Modification 2015-03-03
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Cvss Base Score 6.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#302668

ShareLaTeX vulnerable to remote command execution and information disclosure

Original Release date: 03 Mar 2015 | Last revised: 03 Mar 2015

Overview

ShareLaTeX is a server-based software allowing group collaboration on LaTeX documents. ShareLaTeX prior to version 0.1.3 has been found to be vulnerable to command injections and information disclosure.

Description

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-0933

ShareLaTeX 0.1.3 and previous versions allow a remote user to obtain information about other users or the server on which ShareLaTeX is installed by allowing a user to \include{} any valid absolute path name in the document, which is then forwarded to the latex process. When processed, the output document will contain the contents of the file specified.

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') - CVE-2015-0934

ShareLaTeX prior to version 0.1.3 allows a remote user to run commands on the server with the permissions of the ShareLaTeX process by not properly filtering out backticks from the names of files.

The CVSS score below is based on CVE-2015-0934.

Impact

CVE-2015-0933 allows a remote authenticated user to obtain information about other users or the server on which ShareLaTeX is installed. This information can include information like user accounts, which may be used to mount further attacks against the server.

CVE-2015-0934 allows a remote authenticated user to run commands on the server with the permissions of the ShareLaTeX process.

Note that user authentication as of ShareLaTeX 0.1.3 is currently limited to registering an email address and does not require moderator/administrator approval. Therefore it is possible for an authenticated user to remain anonymous.

Solution

Apply an update

CVE-2015-0934 was addressed in CLSI 0.1.3, which is included in ShareLaTeX 0.1.3. Users are recommended to update as soon as possible. This update does not address CVE-2015-0933, however. You may consider the following workaround for CVE-2015-0933.

Change LaTeX configuration

CVE-2015-0933 may be mitigated by making some changes to the LaTeX configuration file on the server running ShareLaTeX. ShareLaTeX provides some extra security guidance.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
ShareLaTeXAffected-03 Mar 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base6.4AV:N/AC:L/Au:N/C:P/I:P/A:N
Temporal5.0E:POC/RL:OF/RC:C
Environmental1.3CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

  • https://github.com/sharelatex/sharelatex/wiki/Production-Installation-Instructions#securing-latex
  • https://github.com/sharelatex/sharelatex/tree/v0.1.3
  • https://www.pressestelle.tu-berlin.de/menue/tub-medien/publications/press_releases/2015/maerz_2015/media_information_no_46_e/parameter/en/

Credit

Thanks to Tobias Fiebig for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

  • CVE IDs:CVE-2015-0933CVE-2015-0934
  • Date Public:02 Mar 2015
  • Date First Published:03 Mar 2015
  • Date Last Updated:03 Mar 2015
  • Document Revision:44

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/302668

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-77 Improper Sanitization of Special Elements used in a Command ('Command Injection')
50 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2015-03-05 00:26:07
  • Multiple Updates
2015-03-04 09:26:33
  • Multiple Updates
2015-03-03 21:22:16
  • First insertion