Bug 934796 (CVE-2015-3224) - VUL-0: CVE-2015-3224: rubygem-web-console: IP whitelist bypass in Web Console
Summary: VUL-0: CVE-2015-3224: rubygem-web-console: IP whitelist bypass in Web Console
Status: RESOLVED FIXED
Alias: CVE-2015-3224
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 13.2
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-06-15 19:50 UTC by Andreas Stieger
Modified: 2016-03-22 16:18 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-06-15 19:50:17 UTC
Created attachment 637909 [details]
2-1-ip-whitelist.patch

EMBARGOED
CRD: 2015-06-16

IP whitelist bypass in Web Console

There is a remote code execution vulnerability in Web Console.
This vulnerability has been assigned the CVE identifier CVE-2015-3224.

Versions Affected:  All
Not affected:       Environments inaccessible from remote IPs, or without Web Console enabled
Fixed Versions:     2.1.3

Impact 
------ 
Specially crafted remote requests can spoof their origin, bypassing the IP whitelist, in any environment where Web Console is enabled (development and test, by default).

Users whose application is only accessible from localhost (as is the default behaviour in Rails 4.2) are not affected, unless a local proxy is involved.

All affected users should either upgrade or use one of the work arounds immediately. 

Releases 
-------- 
The 2.1.3 release is available at the normal locations. 

Workarounds 
----------- 
To work around this issue, turn off web-console in all environments, by removing/commenting it from the application's Gemfile.

Patches 
------- 
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series.  They are in git-am format and consist of a single changeset. 

* 2-1-ip-whitelist.patch - Patch for 2.1 series 

Please note that only the 2.1.x series is supported at present.  Users of earlier unsupported releases are advised to upgrade as soon as possible.

Credits 
------- 
This vulnerability was reported by both joernchen of Phenoelit and Ben Murphy.  Thanks to each of them for reporting the issue to us and verifying the fix.
Comment 1 Swamp Workflow Management 2015-06-15 22:00:58 UTC
bugbot adjusting priority
Comment 2 Andreas Stieger 2015-06-16 18:35:29 UTC
public
Comment 3 Marcus Meissner 2015-06-17 12:19:27 UTC
only in opensuse factory and sles12 sp1 dev.
Comment 4 Jordi Massaguer 2015-07-01 17:06:52 UTC
in openSUSE Factory there is already the 2.1.3 which is the fixed version.
Comment 6 Marcus Meissner 2016-03-22 16:18:19 UTC
released