Allura Discussion and Allura Forum importing does not restrict URL values specified in attachments. Project administrators can run these imports, which could cause Allura to read local files and expose them.  Exposing internal files then can lead to other exploits, like session hijacking, or remote code execution.

This issue affects Apache Allura from 1.0.1 through 1.15.0.

Users are recommended to upgrade to version 1.16.0, which fixes the issue.  If you are unable to upgrade, set "disable_entry_points.allura.importers = forge-tracker, forge-discussion" in your .ini config file.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-51017 Allura Discussion and Allura Forum importing does not restrict URL values specified in attachments. Project administrators can run these imports, which could cause Allura to read local files and expose them.  Exposing internal files then can lead to other exploits, like session hijacking, or remote code execution. This issue affects Apache Allura from 1.0.1 through 1.15.0. Users are recommended to upgrade to version 1.16.0, which fixes the issue.  If you are unable to upgrade, set "disable_entry_points.allura.importers = forge-tracker, forge-discussion" in your .ini config file.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-09-04T20:12:28.257Z

Reserved: 2023-10-27T16:19:54.325Z

Link: CVE-2023-46851

cve-icon Vulnrichment

Updated: 2024-08-02T20:53:21.859Z

cve-icon NVD

Status : Modified

Published: 2023-11-07T09:15:07.313

Modified: 2024-11-21T08:29:25.597

Link: CVE-2023-46851

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.