The public Slash repo has not been updated in awhile. We've moved to git and long story short, it took us some time to make it available. We hope to update the public repo weekly. It is available on slashcode.git.sourceforge.net, and there's basic instructions available for getting started with the git repo.
The old CVS repo will remain there, but for now, it is ... old. So don't use it unless you want to look at ancient history.
There's no plans for any tarballs or official releases. If this is of value to you, I suggest you consider doing your own releases of it. Talk to me about it if you're interested in moving forward.
Two longstanding security issues were found and fixed in Slash, the code that powers Slashdot, in May 2008. The second of the two -- found and reported to us by Scott R. White, of securestate.com -- is easily exploitable and must be fixed immediately on all Slash 2.x sites.
The first, found and fixed on May 1, was a problem with filtering certain types of form data: form inputs where the form name is matched against a regex. At some point years ago, during refactoring, the code was changed to use a named variable, instead of the default variable, so the matching was not actually being done, and the corresponding values were not being properly sanitized.
No known exploits -- either for the database, or cross-site scripting (XSS) -- exist for this issue, but though a code review was performed and a way was not found to abuse it, that doesn't mean it couldn't be abused.
The second issue, found and fixed on May 23, is similar: the code to properly filter the "sid" of a story was not anchored properly, and additional data could be tacked onto the value and left unsanitized. We thank Scott R. White for alerting us to the problem in a responsible manner.
As with the above issue, no known database exploits exist for this issue, however it is easily exploitable with standard XSS techniques, and all Slash sites must either update to the latest code, or use the patch at the link above to manually fix their site.
Both issues have existed for years. If you are on Slash 2.x, you are almost certainly affected.
As always (not that this happens often!), please contact us about security matters at security@slashcode.com, and join the low-traffic slashcode-general mailing list to keep updated on security-related matters. This security warning has been posted to that list.
On Friday, January 4, 2008, a serious security vulnerability was discovered, and an exploit demonstrated, in the then-current version of Slash. The vulnerability was an SQL injection. Its effect was to allow a user with no special authorization to read any information from any table the Slash site's mysql user was authorized to read (which may include other databases, including information_schema).
This vulnerability has been present in Slash for years. We are not going to list which specific versions of Slash are vulnerable, because as far as we know, they all are. Fortunately for those of you who are not running near-current CVS, the patch is easy to apply to all versions of Slash.
The Slash programming team would like to thank blackybr, of the Russian web-security portal site forum.antichat.ru, for bringing this to our attention in a responsible manner.
The ability of an attacker to read the users table is why we urged Slash sites on Friday to change their admins' passwords. Whether the threat rises to the level of requiring all your users to change their passwords, we leave up to site administrators. Mitigating factors include:
ASCII(SUBSTRING((SELECT x FROM y WHERE z), 1, 1)) > 90.
Absent subqueries, which were added in MySQL 4.1, only data from the
main query's table can be retrieved. In this case, the only
known exploitable table is journals, from which not much
interesting can be learned.One of the first things that an attacker would likely do is to obtain an administrator's password. Since Slash keeps permanent records of all administrator accesses, you may wish to scan that log for unexpected and possibly unauthorized logins. For example:
mysql> SELECT uid, host_addr, MIN(ts), MAX(ts), COUNT(*) FROM accesslog_admin WHERE ts >= '2007-12-01 00:00:00' GROUP BY uid, host_addr;
Today, I have committed two more fields in the $form hashref to
be run through filter_params. They are content_type, for which I
could find no vulnerabilities, and userfield, for which a XSS
vulnerability (less serious than blackybr's) was found. We therefore
again urge Slash site administrators to either update to the latest
version in CVS, or to manually add those two fields to the
alphanumeric $form field filtering done in Environment.pm, as
follows:
diff -U3 -r1.224 -r1.225 --- Slash/Utility/Environment/Environment.pm 4 Jan 2008 19:14:07 -0000 1.224 +++ Slash/Utility/Environment/Environment.pm 7 Jan 2008 21:30:09 -0000 1.225 @@ -1856,8 +1856,8 @@ # fields that have ONLY a-zA-Z0-9_ my %alphas = map {($_ => 1)} qw( - fieldname formkey commentstatus filter - hcanswer mode op section thisname type reskey + content_type fieldname formkey commentstatus filter + hcanswer mode op section thisname type reskey userfield comments_control ), # Survey
Again, this is in addition to the patch
mentioned
on Friday, which added id.
As a personal note: none of us who work on Slash are very pleased with this, of course. The last time we made this kind of announcment was just over three years ago, which, while long, is not long enough.
We regret the oversight, and we will be taking additional steps in the coming weeks to make similar types of vulnerability both less likely and less serious. Please feel free to post any questions on this slashcode.com story, or to email me (Jamie McCarthy) with private concerns at jamie@slashdot.org. To notify us of additional security issues we may not be aware of, please email security@slashcode.com. If you are a Slash site administrator, please subscribe to slashcode-general (it's low-traffic). Thank you.
Whatever version of Slash you are running, please add 'id' to the list of numeric filtered parameters. This list can be found in the filter_params subroutine in Environment.pm. If you are on near-current code, you can just update to current code, as the fix is in CVS. If not, here is the (extremely simple) diff:
diff -U3 -r1.223 -r1.224 --- Slash/Utility/Environment/Environment.pm 24 Oct 2007 21:19:34 -0000 1.223 +++ Slash/Utility/Environment/Environment.pm 4 Jan 2008 19:14:07 -0000 1.224 @@ -1823,7 +1823,7 @@ # fields that are numeric only my %nums = map {($_ => 1)} qw( - approved artcount art_offset bseclev + approved artcount art_offset bseclev id buymore cid clbig clsmall cm_offset commentlimit commentsort commentspill del displaystatus limit
You should also change the passwords for all your admin user accounts.
We are working on a more complete writeup of this issue, and we will append it to this Slashcode.com story on Monday morning, Jan. 7. Please check back then. This message is also being sent to our slashcode-general mailing list (which all Slash site administrators should be reading).
Monday Update: Please see today's story with more information and a new (also small) patch.
REPLACE INTO dst (region, selectable, start_hour, start_wnum, start_wday, start_month, end_hour, end_wnum, end_wday, end_month) VALUES ('America', 1, 2, 2, 0, 2, 2, 1, 0, 10);
Don't forget to run it before DST starts again, at 2 a.m. on the second Sunday in March (March 11 this coming year).