mirror of https://github.com/MISP/misp-website
CVE number added
parent
8370628d38
commit
ff9ee6fdb0
|
@ -6,7 +6,7 @@ featured: /assets/images/misp-small.png
|
|||
|
||||
A new version of MISP ([2.4.99](https://github.com/MISP/MISP/tree/v2.4.99)) has been released with improvements in the UI, API, STIX import and a fixed critical security vulnerability.
|
||||
|
||||
Thanks to Francois-Xavier Stellamans from NCI Agency Cyber Security who reported a critical vulnerability in the STIX 1 import code. The vulnerability allows a malicious authenticated user to inject commands via an incorrectly escaped variable name (the original name of the STIX file). We strongly urge users to update their MISP instance to the latest version. We also replaced the mechanism of storing the original uploaded files on ingestion with a standardised function that will process the files without passing them to external tools - this reusable system will avoid any similar issues in the future if new similar mechanisms are introduced. CVE allocation is pending (the page will be updated when we receive it).
|
||||
Thanks to Francois-Xavier Stellamans from NCI Agency Cyber Security who reported a critical vulnerability in the STIX 1 import code. The vulnerability allows a malicious authenticated user to inject commands via an incorrectly escaped variable name (the original name of the STIX file). We strongly urge users to update their MISP instance to the latest version. We also replaced the mechanism of storing the original uploaded files on ingestion with a standardised function that will process the files without passing them to external tools - this reusable system will avoid any similar issues in the future if new similar mechanisms are introduced. [CVE-2018-19908](https://cve.circl.lu/cve/CVE-2018-19908)
|
||||
|
||||
This release includes the following changes:
|
||||
|
||||
|
|
Loading…
Reference in New Issue