Source: sphinxsearch
Version: 2.2.11-2
Severity: important
Tags: security upstream
Control: found -1 2.2.11-1.1

Hi,

The following vulnerability was published for sphinxsearch.

CVE-2019-14511[0]:
| Sphinx Technologies Sphinx 3.1.1 by default has no authentication and
| listens on 0.0.0.0, making it exposed to the internet (unless filtered
| by a firewall or reconfigured to listen to 127.0.0.1 only).

In any case the admin installing sphinxsearch needs to enable it and
create a /etc/sphinxsearch/sphinx.conf, but the defaults in the sample
files suggested to be copied are by default unsecure listening on
0.0.0.0. The forked project decided to make those safer and switch to
listen to localhost only.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-14511
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14511
[1] 
https://blog.wirhabenstil.de/2019/08/19/sphinxsearch-0-0-0-09306-cve-2019-14511/

Regards,
Salvatore

Reply via email to