Dear list members,
again a media object related security issue has been identified and
fixed for ILIAS versions >= 5.0. A big "Thank you" goes to researcher
Julian Rittweger for reporting this issue.
It was possible to upload SVG files as media objects (e.g. in wiki
pages) which could be used to inject and execute JavaScript (persistent
XSS).
With the latest fix of the responsible code maintainer, SVG files will
be sanitized when uploaded to ILIAS.
We advise strongly to update your ILIAS installation to the latest
version.
Best regards,
Michael Jansen
on behalf of the ILIAS e.V. and the Technical Board
Dear list members,
several security issues have been identified (thanks to Nicolas Schäfli
[studer + raimann ag] and Johannes [KIT]) and fixed for ILIAS version
5.0, 5.1 and 5.2.
The first weakness was located in the code validation part of the self
registration.
The second type of vulnerability affected the XML import of course and
file objects. It was possible to copy arbitrary files into the media
object directory (course import), and to copy a source file to an
arbitrary location on the file system (file import).
We advise strongly to update your ILIAS installation to the latest
version. For more detailed explanations don't hesitate to contact us.
Best regards,
Michael Jansen
on behalf of the ILIAS e.V. and the Technical Board