Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security vulnerabilities discovered #598

Closed
feedersec opened this issue Nov 18, 2015 · 2 comments

Comments

Projects
None yet
3 participants
@feedersec
Copy link

commented Nov 18, 2015

Hi, Could you please get in touch with me to discuss 2 vulnerabilities I've discovered in cherrymusic. feedersec [at] gmail [dot] com. Thanks.

@devsnd

This comment has been minimized.

Copy link
Owner

commented Nov 21, 2015

Thank you very much for checking CM for security vulnerabilities! I have fixed them in the devel branch and will now release a new version.

To all the CM users listening in: The two vulnerabilities found by feedersec could only be exploited by logged-in users. However, especially in the case that you are running CM as root (which you should not!) one of the vulnerabilities could lead to the compromise of your server. I'll release a new version now, please make sure to update as soon as possible.

Many thanks again @feedersec, please contact me again if you find anything in the future!

@devsnd devsnd closed this Nov 21, 2015

@feedersec

This comment has been minimized.

Copy link
Author

commented Nov 21, 2015

Thanks for fixing @devsnd! For the CM community's information, the following CVE references can be used to track the vulnerabilities:

  1. Directory traversal vulnerability allows authenticated users to download arbitrary files. ref: CVE-2015-8309
  2. Persistent XSS vulnerability in the 'playlistname' field allows the insertion of javascript into this field when creating a new playlist. ref: CVE-2015-8310
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.