Published:2023/07/21  Last Updated:2023/07/21

JVN#35897618
GBrowse vulnerable to unrestricted upload of files with dangerous types
Critical

Overview

GBrowse is vulnerable to unrestricted upload of files with dangerous types.

Products Affected

  • GBrowse
The reporter verifies that version 1.70 is vulnerable to this issue, and that version 2.56 restricts uploading non-GFF formatted files. This indicates that the file validation mechanism may have been implemented since version 2.x. However, the actual versions have not been confirmed.

Description

GBrowse provided by Generic Model Organism Database Project is a web-based genome browser. GBrowse allows the users to upload their own data in several file formats (see "GBrowse User Uploads").
The affected versions of GBrowse accept files with any formats uploaded (CWE-434), and place them in the area accessible through unauthenticated web requests.

The reporter states that attacks exploiting this vulnerability have been observed.

Impact

Anyone who can upload files through the product may execute arbitrary code on the server.

Solution

Stop using the product and Switch to the successor
The developer states that GBrowse is no longer supported and recommends using the successor product JBrowse2.

Vendor Status

Vendor Link
Generic Model Organism Database Project GBrowse
JBrowse

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Base Score: 5.3
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:L/Au:N/C:N/I:P/A:N
Base Score: 5.0
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Comment

This analysis assumes that the product allows any unauthenticated users to upload files, hence PR:N, Au:N.

Credit

Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2023-32637
JVN iPedia JVNDB-2023-000073