Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 20 Jun 2015 01:16:57 +0000
From:      bugzilla-noreply@freebsd.org
To:        ruby@FreeBSD.org
Subject:   [Bug 200979] security/vuxml: document devel/rubygem-paperclip security announcement on spoofing issue
Message-ID:  <bug-200979-21402@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200979

            Bug ID: 200979
           Summary: security/vuxml: document devel/rubygem-paperclip
                    security announcement on spoofing issue
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: jason.unovitch@gmail.com
                CC: ports-secteam@FreeBSD.org, ruby@FreeBSD.org
                CC: ports-secteam@FreeBSD.org, ruby@FreeBSD.org

Created attachment 157891
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=157891&action=edit
Document devel/rubygem-papercut security advisory

JVN.jp documents this as CVE-2015-2963

Source: https://robots.thoughtbot.com/paperclip-security-release
"We just released paperclip v4.2.2. This contains only a security patch over
v4.2.1, and everyone is encouraged to upgrade. The commit message explains the
problem and fix:

There is an issue where if an HTML file is uploaded with a .html extension, but
the content type is listed as being image/jpeg, this will bypass a validation
checking for images. But it will also pass the spoof check, because a file
named .html and containing actual HTML passes the spoof check.

This change makes it so that we also check the supplied content type. So even
if the file contains HTML and ends with .html, it doesn’t match the content
type of image/jpeg and so it fails.

This vulnerability was assigned JVN #83881261.

paperclip is a Rubygem that that lets you attach files to ActiveRecord models.

Thanks to Jon Yurek and Mike Burns for their work on this, and special thanks
to MORI Shingo of DeNA Co., Ltd. for reporting the vulnerability."


Validation:
# make validate
/bin/sh /usr/ports/security/vuxml/files/tidy.sh
"/usr/ports/security/vuxml/files/tidy.xsl" "/usr/ports/security/vuxml/vuln.xml"
> "/usr/ports/security/vuxml/vuln.xml.tidy"
>>> Validating...
/usr/local/bin/xmllint --valid --noout /usr/ports/security/vuxml/vuln.xml
>>> Successful.
Checking if tidy differs...
... seems okay
Checking for space/tab...
... seems okay
/usr/local/bin/python2.7 /usr/ports/security/vuxml/files/extra-validation.py
/usr/ports/security/vuxml/vuln.xml

# env PKG_DBDIR=/usr/ports/security/vuxml pkg audit rubygem-paperclip-4.2.1
rubygem-paperclip-4.2.1 is vulnerable:
rubygem-paperclip -- Fix a possible security issue with spoofing
CVE: CVE-2015-2963
WWW:
https://vuxml.FreeBSD.org/freebsd/0f154810-16e4-11e5-a1cf-002590263bf5.html

1 problem(s) in the installed packages found.

# env PKG_DBDIR=/usr/ports/security/vuxml pkg audit rubygem-paperclip-4.2.2
0 problem(s) in the installed packages found.

# env PKG_DBDIR=/usr/ports/security/vuxml pkg audit rubygem-paperclip-4.3.0
0 problem(s) in the installed packages found.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-200979-21402>