Lucene search

K
certCERTVU:302668
HistoryMar 03, 2015 - 12:00 a.m.

ShareLaTeX vulnerable to remote command execution and information disclosure

2015-03-0300:00:00
www.kb.cert.org
20

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.0%

Overview

ShareLaTeX is a server-based software allowing group collaboration on LaTeX documents. ShareLaTeX prior to version 0.1.3 has been found to be vulnerable to command injections and information disclosure.

Description

CWE-22**: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)****-**CVE-2015-0933

ShareLaTeX 0.1.3 and previous versions allow a remote user to obtain information about other users or the server on which ShareLaTeX is installed by allowing a user to \include{} any valid absolute path name in the document, which is then forwarded to the latex process. When processed, the output document will contain the contents of the file specified.

CWE-77**: Improper Neutralization of Special Elements used in a Command (‘Command Injection’) -**CVE-2015-0934

ShareLaTeX prior to version 0.1.3 allows a remote user to run commands on the server with the permissions of the ShareLaTeX process by not properly filtering out backticks from the names of files.

The CVSS score below is based on CVE-2015-0934.


Impact

CVE-2015-0933 allows a remote authenticated user to obtain information about other users or the server on which ShareLaTeX is installed. This information can include information like user accounts, which may be used to mount further attacks against the server.

CVE-2015-0934 allows a remote authenticated user to run commands on the server with the permissions of the ShareLaTeX process.

Note that user authentication as of ShareLaTeX 0.1.3 is currently limited to registering an email address and does not require moderator/administrator approval. Therefore it is possible for an authenticated user to remain anonymous.


Solution

Apply an update

CVE-2015-0934 was addressed in CLSI 0.1.3, which is included in ShareLaTeX 0.1.3. Users are recommended to update as soon as possible. This update does not address CVE-2015-0933, however. You may consider the following workaround for CVE-2015-0933.


Change LaTeX configuration

CVE-2015-0933 may be mitigated by making some changes to the LaTeX configuration file on the server running ShareLaTeX. ShareLaTeX provides some extra security guidance.


Vendor Information

302668

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

ShareLaTeX Affected

Updated: March 03, 2015

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector
Base 6.4 AV:N/AC:L/Au:N/C:P/I:P/A:N
Temporal 5 E:POC/RL:OF/RC:C
Environmental 1.3 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Tobias Fiebig for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2015-0933, CVE-2015-0934
Date Public: 2015-03-02 Date First Published:

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.0%

Related for VU:302668