SB2016010811 - Fedora EPEL 6 update for prosody
Published: January 8, 2016 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2016-1231)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the HTTP file-serving module (mod_http_files) in Prosody 0.9.x before 0.9.9. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to read arbitrary files via a . (dot dot) in an unspecified path.
2) Input validation error (CVE-ID: CVE-2016-1232)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The mod_dialback module in Prosody before 0.9.9 does not properly generate random values for the secret token for server-to-server dialback authentication, which makes it easier for attackers to spoof servers via a brute force attack. <a href="https://cwe.mitre.org/data/definitions/338.html">CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)</a>
Remediation
Install update from vendor's website.