Bug 937786 (CVE-2015-5395) - CVE-2015-5395: lack of CSRF protection in sogo
Summary: CVE-2015-5395: lack of CSRF protection in sogo
Status: RESOLVED FIXED
Alias: CVE-2015-5395
Product: openSUSE.org
Classification: openSUSE
Component: 3rd party software (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Christian Schweingruber
QA Contact: E-mail List
URL: https://smash.suse.de/issue/118568/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-07-13 07:55 UTC by Andreas Stieger
Modified: 2019-06-18 08:56 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-07-13 07:55:22 UTC
Courtesy bug from the SUSE Security team:
http://www.sogo.nu/bugs/view.php?id=3246
0003246: No CSRF token - requests can be forged

No CSRF token is used when creating events in calendar, adding contacts, ...
An attacker can therefore prepare a website that triggers POST requests for a victim to preform actions under his/her account.

only the username of the victim needs to be known.

- create a new contact
- intercept and save the request
- replace your username with the username of the victim in the request
- create a webpage that sends the POST request automatically
- lure the victim into visiting your webpage
- if the victim is still logged in the action will be performed (ie. send him/her an email with a link to your site)




Dear maintainers, no upstream release is available. Reference this bug and CVE when you commit a patch or submit a fixed release.

References:
http://www.sogo.nu/bugs/view.php?id=3246
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5395
http://seclists.org/oss-sec/2015/q3/86
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5395
Comment 1 Christian Schweingruber 2015-08-10 06:37:16 UTC
this issue needs to be solved upstream
Comment 2 Christian Schweingruber 2019-06-18 08:56:54 UTC
The issue is resolved upstream for Versions 3 and 4 of SOGo:
https://sogo.nu/bugs/view.php?id=3246

https://github.com/inverse-inc/sogo/commit/582baf2960969c73f98643e46cfb49432c30b711