Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.3226 MISP 2.4.132 released (security fix CVE-2020-25766 and bugs fixed) 22 September 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MISP Publisher: MISP Project Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Delete Arbitrary Files -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-25766 Original Bulletin: https://www.misp-project.org/2020/09/21/MISP.2.4.132.released.html - --------------------------BEGIN INCLUDED TEXT-------------------- MISP 2.4.132 released A new version of MISP (2.4.132) has been released with several bugs fixed including an important security fix CVE-2020-25766. Bugs fixed and updates o [bootstrap-datepicker] Updated to version 1.9.0 o [tag filters] fixed a bug introduced with the previous filter fix, resulting in multiple OR tags being ignored as a valid filter. o [internal] Correctly handle positive tag filters for non site admins. o [sightings] anonymise pushed sightings using new Sightings_anonymise_as setting. CVE-2020-25766 An issue was discovered in MISP before 2.4.132. This could lead to an unwanted actions (such as an event deletion) being triggered. Thanks to Michael Kerscher for the report. It was discovered that under certain situations (resource exhaustion when retrieving sessions data for example), a user could incorrectly receive the login page as a response when paginating the event view's attribute list. This in itself should not cause any issues, but due to a bug in the login form's GET /POST exchange, the user actually having a valid session would instead retrieve the event index, on which the first form was submitted (which was an event deletion). In normal situations this is extremely rare and we have only identified a handful of such deletions on our most heavily used community instances. Version 2.4.133 will include a new diagnostic tool that highlights deletions from the time period when the bug was active along with a recovery functionality. Many bugs fixed and small improvements A host of other improvements are documented in the complete changelog is available. Acknowledgement We would like to thank all the contributors, reporters and users who have helped us in the past months to improve MISP and information sharing at large. This release includes multiple updates in misp-objects, misp-taxonomies and misp-galaxy. As always, a detailed and complete changelog is available with all the fixes, changes and improvements. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX2k2z+NLKJtyKPYoAQhk9g//Xehgqt3TfNE3REuLfCy6WFvw9b8w67hB UBVTrhGTk7xssq/j2nx4j0fTxFg88byUkEOdv+ZjpgjIaOnwrJMlhzGsEwHdKue2 H4U4ztPH6I7qIf2uqLGIaSQn+Cx67TsVlUqen1vTLNdo1X8zHoH3/qO/ucwJbnbf B1pT6O3c6GFFsyjYTRBe7dlQMqQNcB51CEsviCPDgaWN+QeRu27l4KbQvjyoUz7X 0AWoH67m4HcIs61JtGM8FQAFJgw7XGjaNg7RVhaXAEPuLCQrzsYe+0pt6H74rw1u ql8o2oie50zc8l7npivaO5fgjK8g2Rt/xm13VXq+lViAdXqKDs0yNL8952mqxesd /bO4qrmT0Cf2xqboMreviIL6ZrjuwN/wG9iWXW66jcr2osywqMD0juaw9iJ7cSB1 MhAsdxsqdQ/dXiRYj3RhYUGoYaPcQ0uVs3/OtlZm/5aQk6X1j0HyRZaR2z4Eif9g ehiQePIwzJAsrTWCbL6Y2zFLDHPfmuWrfpbPVcIPhVs62O8oPNgLQlHVzauP0qEz XfoEHmK3XKsGiZnIFyJHPLONcRxsiC6ecBF1W+nbss/NbaVcfLG92WCRtCkm3RFd fP93aIr4g380br4D5UArHzVwMX1wWkmqqXKHFm5Idfz4vDGrSvNncXlyrW5Ladam QmwpUIVXSkM= =9ogv -----END PGP SIGNATURE-----