-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3226
    MISP 2.4.132 released (security fix CVE-2020-25766 and bugs fixed)
                             22 September 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           MISP
Publisher:         MISP Project
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Delete Arbitrary Files -- Existing Account
                   Reduced Security       -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-25766  

Original Bulletin: 
   https://www.misp-project.org/2020/09/21/MISP.2.4.132.released.html

- --------------------------BEGIN INCLUDED TEXT--------------------

MISP 2.4.132 released

A new version of MISP (2.4.132) has been released with several bugs fixed
including an important security fix CVE-2020-25766.

Bugs fixed and updates

  o [bootstrap-datepicker] Updated to version 1.9.0
  o [tag filters] fixed a bug introduced with the previous filter fix,
    resulting in multiple OR tags being ignored as a valid filter.
  o [internal] Correctly handle positive tag filters for non site admins.
  o [sightings] anonymise pushed sightings using new Sightings_anonymise_as
    setting.

CVE-2020-25766

An issue was discovered in MISP before 2.4.132. This could lead to an unwanted
actions (such as an event deletion) being triggered. Thanks to Michael Kerscher
for the report.

It was discovered that under certain situations (resource exhaustion when
retrieving sessions data for example), a user could incorrectly receive the
login page as a response when paginating the event view's attribute list. This
in itself should not cause any issues, but due to a bug in the login form's GET
/POST exchange, the user actually having a valid session would instead retrieve
the event index, on which the first form was submitted (which was an event
deletion). In normal situations this is extremely rare and we have only
identified a handful of such deletions on our most heavily used community
instances.

Version 2.4.133 will include a new diagnostic tool that highlights deletions
from the time period when the bug was active along with a recovery
functionality.

Many bugs fixed and small improvements

A host of other improvements are documented in the complete changelog is
available.

Acknowledgement

We would like to thank all the contributors, reporters and users who have
helped us in the past months to improve MISP and information sharing at large.
This release includes multiple updates in misp-objects, misp-taxonomies and
misp-galaxy.

As always, a detailed and complete changelog is available with all the fixes,
changes and improvements.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBX2k2z+NLKJtyKPYoAQhk9g//Xehgqt3TfNE3REuLfCy6WFvw9b8w67hB
UBVTrhGTk7xssq/j2nx4j0fTxFg88byUkEOdv+ZjpgjIaOnwrJMlhzGsEwHdKue2
H4U4ztPH6I7qIf2uqLGIaSQn+Cx67TsVlUqen1vTLNdo1X8zHoH3/qO/ucwJbnbf
B1pT6O3c6GFFsyjYTRBe7dlQMqQNcB51CEsviCPDgaWN+QeRu27l4KbQvjyoUz7X
0AWoH67m4HcIs61JtGM8FQAFJgw7XGjaNg7RVhaXAEPuLCQrzsYe+0pt6H74rw1u
ql8o2oie50zc8l7npivaO5fgjK8g2Rt/xm13VXq+lViAdXqKDs0yNL8952mqxesd
/bO4qrmT0Cf2xqboMreviIL6ZrjuwN/wG9iWXW66jcr2osywqMD0juaw9iJ7cSB1
MhAsdxsqdQ/dXiRYj3RhYUGoYaPcQ0uVs3/OtlZm/5aQk6X1j0HyRZaR2z4Eif9g
ehiQePIwzJAsrTWCbL6Y2zFLDHPfmuWrfpbPVcIPhVs62O8oPNgLQlHVzauP0qEz
XfoEHmK3XKsGiZnIFyJHPLONcRxsiC6ecBF1W+nbss/NbaVcfLG92WCRtCkm3RFd
fP93aIr4g380br4D5UArHzVwMX1wWkmqqXKHFm5Idfz4vDGrSvNncXlyrW5Ladam
QmwpUIVXSkM=
=9ogv
-----END PGP SIGNATURE-----