Security Release for issue #14290

Brandon Da Costa and Mahdi Afshar have found that sao executes JavaScript included in HTML documents (such as attachments). These documents may be uploaded by any authenticated user. The JavaScript is executed in the same context as sao which gives access to sensitive data such as the session.

Impact

CVSS v3.0 Base Score: 7.3

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality: High
  • Integrity: High
  • Availability: None

If the inbound_email and document_incoming modules are activated, the impact increases as anybody can send emails with attachments: CVSS v3.0 Base Score: 8.1

Workaround

There is no general workaround.
For inbound email blocking emails with HTML attachments will block this attack vector.

Resolution

All affected users should upgrade sao to the latest version.

Affected versions per series:

  • sao:
    • 7.6: <= 7.6.8
    • 7.4: <= 7.4.18
    • 7.0: <= 7.0.37
    • 6.0: <= 6.0.66

Non affected versions per series:

  • sao:
    • 7.6: >= 7.6.9
    • 7.4: >= 7.4.19
    • 7.0: >= 7.0.38
    • 6.0: >= 6.0.67

Reference

Concerns?

Any security concerns should be reported on the bug-tracker at https://bugs.tryton.org/ with the confidential checkbox checked.