1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406
|
From be1f4e2dc47fd2c6c4589d21f13e733767a01b20 Mon Sep 17 00:00:00 2001
From: Andrew Ruthven <andrew@etc.gen.nz>
Date: Sat, 3 May 2025 23:57:58 +1200
Subject: Fix four security issues in RT.
* RT is vulnerable to Cross Site Scripting via injection of malicious
parameters in a search URL. This vulnerability is assigned CVE-2025-30087.
* RT uses the default OpenSSL cipher, 3DES (des3), for encrypting SMIME email.
This is an outdated cipher algorithm, so the default is changed to
aes-128-cbc. In addition, we have made this option configurable so you can
pick an alternate cipher now or in the future, or revert to des3 if needed
for compatibility. This vulnerability is assigned CVE-2025-2545.
* RT is vulnerable to Cross Site Scripting via JavaScript injection in an
Asset name. This vulnerability is assigned CVE-2025-31501.
* RT is vulnerable to Cross Site Scripting via JavaScript injection in an RT
permalink. This vulnerability is assigned CVE-2025-31500.
Patch-Name: upstream_5.0.7_cve:_patchset_2025-04-08.diff
Author: Best Practical <support@bestpractical.com>
Forwarded: not-needed
Applied: 5.0.8
---
etc/RT_Config.pm | 24 +++
lib/RT/Crypt/SMIME.pm | 2 +-
lib/RT/Interface/Web.pm | 9 +-
lib/RT/Interface/Web/Scrubber/Restrictive.pm | 148 +++++++++++++++++++
share/html/Asset/Elements/TSVExport | 2 +-
share/html/Elements/CollectionList | 4 +-
share/html/Elements/TSVExport | 2 +-
share/html/Helpers/Permalink | 4 +
share/html/Search/Build.html | 2 +-
share/html/Search/Edit.html | 2 +-
share/static/js/util.js | 13 +-
11 files changed, 202 insertions(+), 10 deletions(-)
create mode 100644 lib/RT/Interface/Web/Scrubber/Restrictive.pm
diff --git a/etc/RT_Config.pm b/etc/RT_Config.pm
index 4dadaded..e358cec3 100644
--- a/etc/RT_Config.pm
+++ b/etc/RT_Config.pm
@@ -1264,6 +1264,26 @@ higher numbers denoting greater effort.
Set($BcryptCost, 12);
+=item C<@RestrictLinkDomains>
+
+This sets a list of external domains that RT is allowed to link to. If this
+setting is empty, no external domains are allowed.
+
+Currently, this restriction only applies to links in Format parameter for
+search results. All external links whose domains are not in the list will
+be removed.
+
+E.g.
+
+ Set(@RestrictLinkDomains, ("example.com", "*.trusted.com"));
+
+ example.com # Allow links to "example.com"
+ *.trusted.com # Allow links to any one-level subdomain of "trusted.com"
+
+=cut
+
+Set(@RestrictLinkDomains, ());
+
=back
=head2 Internationalization
@@ -4279,6 +4299,9 @@ Set C<CheckRevocationDownloadTimeout> to the timeout in seconds for
downloading a CRL or an issuer certificate (the latter is used when
checking against OCSP). The default timeout is 30 seconds.
+Set C<Cipher> to the encryption algorithm to use. By default, it's
+C<aes-128-cbc>.
+
See L<RT::Crypt::SMIME> for details.
=back
@@ -4297,6 +4320,7 @@ Set( %SMIME,
CheckCRL => 0,
CheckOCSP => 0,
CheckRevocationDownloadTimeout => 30,
+ Cipher => 'aes-128-cbc',
);
=head3 GnuPG configuration
diff --git a/lib/RT/Crypt/SMIME.pm b/lib/RT/Crypt/SMIME.pm
index d6d0e76d..778105e4 100644
--- a/lib/RT/Crypt/SMIME.pm
+++ b/lib/RT/Crypt/SMIME.pm
@@ -430,7 +430,7 @@ sub _SignEncrypt {
$key = $key_file;
}
push @commands, [
- $self->OpenSSLPath, qw(smime -encrypt -des3),
+ $self->OpenSSLPath, qw(smime -encrypt), '-' . ( $opts->{Cipher} || 'aes-128-cbc' ),
map { $_->filename } @keys
];
}
diff --git a/lib/RT/Interface/Web.pm b/lib/RT/Interface/Web.pm
index 057e741d..4c961e93 100644
--- a/lib/RT/Interface/Web.pm
+++ b/lib/RT/Interface/Web.pm
@@ -76,6 +76,7 @@ use RT::Interface::Web::Menu;
use RT::Interface::Web::Session;
use RT::Interface::Web::Scrubber;
use RT::Interface::Web::Scrubber::Permissive;
+use RT::Interface::Web::Scrubber::Restrictive;
use RT::Util ();
use Digest::MD5 ();
use List::MoreUtils qw();
@@ -4904,7 +4905,7 @@ sub _parse_saved_search {
return ( _load_container_object( $obj_type, $obj_id ), $search_id );
}
-=head2 ScrubHTML Content => CONTENT, Permissive => 1|0, SkipStructureCheck => 1|0
+=head2 ScrubHTML Content => CONTENT, Permissive => 1|0, Restrictive => 1|0, SkipStructureCheck => 1|0
Removes unsafe and undesired HTML from the passed content
@@ -4921,14 +4922,18 @@ sub ScrubHTML {
state $scrubber = RT::Interface::Web::Scrubber->new;
state $permissive_scrubber = RT::Interface::Web::Scrubber::Permissive->new;
+ state $restrictive_scrubber = RT::Interface::Web::Scrubber::Restrictive->new;
if ( $HTML::Mason::Commands::ReloadScrubber ) {
$scrubber = RT::Interface::Web::Scrubber->new;
$permissive_scrubber = RT::Interface::Web::Scrubber::Permissive->new;
+ $restrictive_scrubber = RT::Interface::Web::Scrubber::Restrictive->new;
$HTML::Mason::Commands::ReloadScrubber = 0;
}
- return ( $args{Permissive} ? $permissive_scrubber : $scrubber )->scrub( $args{Content}, $args{SkipStructureCheck} );
+ return ( $args{Restrictive} ? $restrictive_scrubber : ( $args{Permissive} ? $permissive_scrubber : $scrubber ) )
+ ->scrub( $args{Content}, $args{SkipStructureCheck} );
+
}
=head2 JSON
diff --git a/lib/RT/Interface/Web/Scrubber/Restrictive.pm b/lib/RT/Interface/Web/Scrubber/Restrictive.pm
new file mode 100644
index 00000000..aecfca88
--- /dev/null
+++ b/lib/RT/Interface/Web/Scrubber/Restrictive.pm
@@ -0,0 +1,148 @@
+# BEGIN BPS TAGGED BLOCK {{{
+#
+# COPYRIGHT:
+#
+# This software is Copyright (c) 1996-2024 Best Practical Solutions, LLC
+# <sales@bestpractical.com>
+#
+# (Except where explicitly superseded by other copyright notices)
+#
+#
+# LICENSE:
+#
+# This work is made available to you under the terms of Version 2 of
+# the GNU General Public License. A copy of that license should have
+# been provided with this software, but in any event can be snarfed
+# from www.gnu.org.
+#
+# This work is distributed in the hope that it will be useful, but
+# WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+# General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+# 02110-1301 or visit their web page on the internet at
+# http://www.gnu.org/licenses/old-licenses/gpl-2.0.html.
+#
+#
+# CONTRIBUTION SUBMISSION POLICY:
+#
+# (The following paragraph is not intended to limit the rights granted
+# to you to modify and distribute this software under the terms of
+# the GNU General Public License and is only of importance to you if
+# you choose to contribute your changes and enhancements to the
+# community by submitting them to Best Practical Solutions, LLC.)
+#
+# By intentionally submitting any modifications, corrections or
+# derivatives to this work, or any other work intended for use with
+# Request Tracker, to Best Practical Solutions, LLC, you confirm that
+# you are the copyright holder for those contributions and you grant
+# Best Practical Solutions, LLC a nonexclusive, worldwide, irrevocable,
+# royalty-free, perpetual, license to use, copy, create derivative
+# works based on those contributions, and sublicense and distribute
+# those contributions and any derivatives thereof.
+#
+# END BPS TAGGED BLOCK }}}
+
+package RT::Interface::Web::Scrubber::Restrictive;
+use strict;
+use warnings;
+use 5.010;
+use base qw/RT::Interface::Web::Scrubber/;
+
+
+=head1 NAME
+
+RT::Interface::Web::Scrubber::Restrictive
+
+=head1 DESCRIPTION
+
+This is a subclass of L<RT::Interface::Web::Scrubber>. It's stricter than
+L<RT::Interface::Web::Scrubber> with the following additional restrictions:
+
+=over 4
+
+=item Links
+
+External domains not defined in L<RT_Config/RestrictLinkDomains> will be removed.
+
+=back
+
+=head1 VARIABLES
+
+These variables can be altered by creating a C<Restrictive_Local.pm>
+file, containing something of the form:
+
+ package RT::Interface::Web::Scrubber::Restrictive;
+
+ # Deny the "alt" attribute of images
+ $RULES{'img'} = { alt => 0 };
+
+=over
+
+=item C<%RULES>
+
+Passed to L<HTML::Scrubber/rules>.
+
+=back
+
+=cut
+
+our %RULES = (
+ a => {
+ $RT::Interface::Web::Scrubber::RULES{a} ? %{ $RT::Interface::Web::Scrubber::RULES{a} } : (),
+ href => sub {
+ my ( $self, $tag, $attr, $href ) = @_;
+ return $href unless $href;
+
+ # Allow internal RT macros like __WebPath__, etc.
+ return $href if $href =~ qr{^(?:/|__Web(?:Path|HomePath|BaseURL|URL)__)}i;
+
+ my $uri = URI->new($href);
+ unless ( $uri->can("host") && $uri->host ) {
+ RT->Logger->warn("Unknown link: $href");
+ return '';
+ }
+
+ my $rt_host = RT::Interface::Web::_NormalizeHost( RT->Config->Get('WebBaseURL') )->host;
+ my $host = lc $uri->host;
+ for my $allowed_domain ( $rt_host, @{ RT->Config->Get('RestrictLinkDomains') || [] } ) {
+ if ( $allowed_domain =~ /\*/ ) {
+
+ # Turn a literal * into a domain component or partial component match.
+ my $regex = join "[a-zA-Z0-9\-]*", map { quotemeta($_) }
+ split /\*/, $allowed_domain;
+ return $href if $host =~ /^$regex$/i;
+ }
+ else {
+ return $href if $host eq lc($allowed_domain);
+ }
+ }
+
+ RT->Logger->warning("Blocked link: $href");
+ return '';
+ },
+ },
+);
+
+=head1 METHODS
+
+=head2 new
+
+Returns a new L<RT::Interface::Web::Scrubber::Restrictive> object.
+
+=cut
+
+sub new {
+ my $class = shift;
+ my $self = $class->SUPER::new(@_);
+
+ $self->rules(%RULES);
+ return $self;
+}
+
+RT::Base->_ImportOverlays();
+
+1;
diff --git a/share/html/Asset/Elements/TSVExport b/share/html/Asset/Elements/TSVExport
index c2f89a5c..d00fd158 100644
--- a/share/html/Asset/Elements/TSVExport
+++ b/share/html/Asset/Elements/TSVExport
@@ -58,7 +58,7 @@ require HTML::Entities;
$r->content_type('application/vnd.ms-excel');
-my $DisplayFormat = $m->comp('/Elements/ScrubHTML', Content => $Format);
+my $DisplayFormat = $m->comp('/Elements/ScrubHTML', Content => $Format, Restrictive => 1);
my @Format = $m->comp('/Elements/CollectionAsTable/ParseFormat', Format => $DisplayFormat);
diff --git a/share/html/Elements/CollectionList b/share/html/Elements/CollectionList
index 02cf74e5..322b0e9a 100644
--- a/share/html/Elements/CollectionList
+++ b/share/html/Elements/CollectionList
@@ -102,8 +102,8 @@ $Collection->GotoPage( $Page - 1 );
$DisplayFormat ||= $Format;
# Scrub the html of the format string to remove any potential nasties.
-$Format = $m->comp('/Elements/ScrubHTML', Content => $Format, SkipStructureCheck => 1);
-$DisplayFormat = $m->comp('/Elements/ScrubHTML', Content => $DisplayFormat, SkipStructureCheck => 1);
+$Format = $m->comp('/Elements/ScrubHTML', Content => $Format, SkipStructureCheck => 1, Restrictive => 1);
+$DisplayFormat = $m->comp('/Elements/ScrubHTML', Content => $DisplayFormat, SkipStructureCheck => 1, Restrictive => 1);
my @Format = $m->comp('/Elements/CollectionAsTable/ParseFormat', Format => $DisplayFormat);
diff --git a/share/html/Elements/TSVExport b/share/html/Elements/TSVExport
index 926d95b8..beaa4cc6 100644
--- a/share/html/Elements/TSVExport
+++ b/share/html/Elements/TSVExport
@@ -62,7 +62,7 @@ $Class ||= $Collection->ColumnMapClassName;
$r->content_type('application/vnd.ms-excel');
$r->header_out( 'Content-disposition' => "attachment; filename=$Filename" ) if $Filename;
-my $DisplayFormat = $m->comp('/Elements/ScrubHTML', Content => $Format);
+my $DisplayFormat = $m->comp('/Elements/ScrubHTML', Content => $Format, Restrictive => 1);
my @Format = $m->comp('/Elements/CollectionAsTable/ParseFormat', Format => $DisplayFormat);
diff --git a/share/html/Helpers/Permalink b/share/html/Helpers/Permalink
index 226db01d..b9c722a8 100644
--- a/share/html/Helpers/Permalink
+++ b/share/html/Helpers/Permalink
@@ -87,6 +87,10 @@ $shortener->LoadByCode($Code);
if ( $URL =~ m{^/} ) {
$URL = RT->Config->Get('WebBaseURL') . RT->Config->Get('WebPath') . $URL;
}
+else {
+ RT->Logger->warning("Invalid URL: $URL");
+ $URL = '';
+}
my %data;
if ( $shortener->Id ) {
diff --git a/share/html/Search/Build.html b/share/html/Search/Build.html
index d01e4dc7..3827c4f0 100644
--- a/share/html/Search/Build.html
+++ b/share/html/Search/Build.html
@@ -222,7 +222,7 @@ if ( $NewQuery ) {
}
if ( $query{'Format'} ) {
# Clean unwanted junk from the format
- $query{'Format'} = $m->comp( '/Elements/ScrubHTML', Content => $query{'Format'} );
+ $query{'Format'} = $m->comp( '/Elements/ScrubHTML', Content => $query{'Format'}, Restrictive => 1 );
}
if ( !$ARGS{SavedSearchLoad} and ( my $extra_params = $current->{ExtraQueryParams} ) ) {
diff --git a/share/html/Search/Edit.html b/share/html/Search/Edit.html
index 95d63a81..90b21ebd 100644
--- a/share/html/Search/Edit.html
+++ b/share/html/Search/Edit.html
@@ -93,7 +93,7 @@ else {
$title = loc("Edit Query")
}
-$Format = $m->comp('/Elements/ScrubHTML', Content => $Format);
+$Format = $m->comp('/Elements/ScrubHTML', Content => $Format, Restrictive => 1);
my $QueryString = $m->comp('/Elements/QueryString',
Query => $Query,
Format => $Format,
diff --git a/share/static/js/util.js b/share/static/js/util.js
index bc075ac7..b50bb95b 100644
--- a/share/static/js/util.js
+++ b/share/static/js/util.js
@@ -681,6 +681,17 @@ function escapeRegExp(str) {
return str.replace(/[.*+?^${}()|[\]\\]/g, "\\$&"); // $& means the whole matched string
}
+function escapeHTML(str) {
+ return str
+ .replace(/&/g, "&")
+ .replace(/</g, "<")
+ .replace(/>/g, ">")
+ .replace(/\(/g, "(")
+ .replace(/\)/g, ")")
+ .replace(/"/g, """)
+ .replace(/'/g, "'");
+}
+
function createCookie(name,value,days) {
var path = RT.Config.WebPath ? RT.Config.WebPath : "/";
@@ -1359,7 +1370,7 @@ jQuery(function () {
dataType: "json",
success : function (results) {
jQuery.each(results.actions, function (i, action) {
- jQuery.jGrowl(action, { themeState: 'none' });
+ jQuery.jGrowl(escapeHTML(action), { themeState: 'none' });
});
refreshCollectionListRow(
|