<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for civetweb</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:1424-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-10-31T15:08:27Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-10-31T15:08:27Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-10-31T15:08:27Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for civetweb</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for civetweb fixes the following issues:

Version 1.15:

* boo#1191938 / CVE-2020-27304: missing uploaded filepath validation in the default form-based file upload mechanism
* New configuration for URL decoding
* Sanitize filenames in handle form
* Example “embedded_c.c”: Do not overwrite files (possible security issue)
* Remove obsolete examples
* Remove “experimental” label for some features
* Remove MG_LEGACY_INTERFACE that have been declared obsolete in 2017 or earlier
* Modifications to build scripts, required due to changes in the test environment
* Unix domain socket support fixed
* Fixes for NO_SSL_DL
* Fixes for some warnings / static code analysis

Version 1.14:

* Change SSL default setting to use TLS 1.2 as minimum (set config if you need an earlier version)
* Add local_uri_raw field (not sanitized URI) to request_info
* Additional API functions and a callback after closing connections
* Allow mbedTLS as OpenSSL alternative (basic functionality)
* Add OpenSSL 3.0 support (OpenSSL 3.0 Alpha 13)
* Support UNIX/Linux domain sockets
* Fuzz tests and ossfuzz integration
* Compression for websockets
* Restructure some source files
* Improve documentation
* Fix HTTP range requests
* Add some functions for Lua scripts/LSP
* Build system specific fixes (CMake, MinGW)
* Update 3rd party components (Lua, lfs, sqlite)
* Allow Lua background script to use timers, format and filter logs
* Remove WinCE code
* Update version number 

Version 1.13:

* Add arguments for CGI interpreters
* Support multiple CGi interpreters
* Buffering HTTP response headers, including API functions mg_response_header_* in C and Lua
* Additional C API functions
* Fix some memory leaks
* Extended use of atomic operations (e.g., for server stats)
* Add fuzz tests
* Set OpenSSL 1.1 API as default (from 1.0)
* Add Lua 5.4 support and deprecate Lua 5.1
* Provide additional Lua API functions
* Fix Lua websocket memory leak when closing the server
* Remove obsolete 'file in memory' implementation
* Improvements and fixes in documentation
* Fixes from static source code analysis
* Additional unit tests
* Various small bug fixes
* Experimental support for some HTTP2 features (not ready for production)
* Experimental support for websocket compression
* Remove legacy interfaces declared obsolete since more than 3 years

Version 1.12 

* See https://github.com/civetweb/civetweb/releases/tag/v1.12 for detailed changelog
  
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-1424</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJTZUANR73SYTZDQ6GMWGRR5O4MCEJA4/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:1424-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191938</URL>
      <Description>SUSE Bug 1191938</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27304/</URL>
      <Description>SUSE CVE CVE-2020-27304 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="civetweb-1.15-lp152.2.3.1">
      <FullProductName ProductID="civetweb-1.15-lp152.2.3.1">civetweb-1.15-lp152.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="civetweb-devel-1.15-lp152.2.3.1">
      <FullProductName ProductID="civetweb-devel-1.15-lp152.2.3.1">civetweb-devel-1.15-lp152.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcivetweb-cpp1_15_0-1.15-lp152.2.3.1">
      <FullProductName ProductID="libcivetweb-cpp1_15_0-1.15-lp152.2.3.1">libcivetweb-cpp1_15_0-1.15-lp152.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcivetweb1_15_0-1.15-lp152.2.3.1">
      <FullProductName ProductID="libcivetweb1_15_0-1.15-lp152.2.3.1">libcivetweb1_15_0-1.15-lp152.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="civetweb-1.15-lp152.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:civetweb-1.15-lp152.2.3.1">civetweb-1.15-lp152.2.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="civetweb-devel-1.15-lp152.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:civetweb-devel-1.15-lp152.2.3.1">civetweb-devel-1.15-lp152.2.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcivetweb-cpp1_15_0-1.15-lp152.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libcivetweb-cpp1_15_0-1.15-lp152.2.3.1">libcivetweb-cpp1_15_0-1.15-lp152.2.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcivetweb1_15_0-1.15-lp152.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libcivetweb1_15_0-1.15-lp152.2.3.1">libcivetweb1_15_0-1.15-lp152.2.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal</Note>
    </Notes>
    <CVE>CVE-2020-27304</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:civetweb-1.15-lp152.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:civetweb-devel-1.15-lp152.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libcivetweb-cpp1_15_0-1.15-lp152.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libcivetweb1_15_0-1.15-lp152.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJTZUANR73SYTZDQ6GMWGRR5O4MCEJA4/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27304.html</URL>
        <Description>CVE-2020-27304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191938</URL>
        <Description>SUSE Bug 1191938</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
