-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3920
                       graphite-web security update
                              22 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           graphite-web
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-18638  

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/10/msg00030.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running graphite-web check for an updated version of the software 
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

[SECURITY] [DLA 1962-1] graphite-web security update

Package        : graphite-web
Version        : 0.9.12+debian-6+deb8u1
CVE ID         : CVE-2017-18638


The 'send_email' function in graphite-web/webapp/graphite/composer/views.py
in Graphite is vulnerable to SSRF. The vulnerable SSRF endpoint can be used
by an attacker to have the Graphite web server request any resource.
The response to this SSRF request is encoded into an image file and then sent
to an e-mail address that can be supplied by the attacker. Thus, an attacker
can exfiltrate any information.

For Debian 8 "Jessie", this problem has been fixed in version
0.9.12+debian-6+deb8u1.

We recommend that you upgrade your graphite-web packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


- -----BEGIN PGP SIGNATURE-----
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=6+LF
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=VPNl
-----END PGP SIGNATURE-----