Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 844013a8 by Salvatore Bonaccorso at 2018-03-20T14:38:53+01:00 mark CVE-2018-7667 as fixed with 4.5.0-1 The 4.4.0 upstream version adds two mitigations steps for the issue, which maybe could be better solved by restricting access to server instances configured via a configuration file on adminer's side? (like phpmyadmin approach). But so far there probably not much more upstream can do, and admins af an adminer instance could additionaly restrict access to the adminer instance via upfront authentication. - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== --- a/data/CVE/list +++ b/data/CVE/list @@ -2650,7 +2650,7 @@ CVE-2018-7669 CVE-2018-7668 (TestLink through 1.9.16 allows remote attackers to read arbitrary ...) NOT-FOR-US: TestLink CVE-2018-7667 (Adminer through 4.3.1 has SSRF via the server parameter. ...) - - adminer <unfixed> + - adminer 4.5.0-1 NOTE: http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt NOTE: https://github.com/vrana/adminer/commit/0fae40fb611b5c8167fa2b8d40bf576a8935a380 NOTE: adminer 4.4.0 disallows connecting to privileged ports, and thus not "enumerating" View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/844013a8e113f002abfb8355b5364d476522c5a4 --- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/844013a8e113f002abfb8355b5364d476522c5a4 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits