VWE-2017-3682 Printable Version

https://www.vaultwiki.org/pages/Book/Documentation/VWE-2017-3682
This page is a chapter in Info Known Vulnerabilities

This page has been seen 314,442 times.

    • Created by on
      Last updated by on
Common NameNone
VWE-IDVWE-2017-3682
Related ReportNone
SeverityHIGH
Exploit DifficultyDifficult
PlatformAffects all platforms supported by the vulnerable versions.
DescriptionCAN-SPAM Non-compliance. Some wiki subscriptions imported from another installation running VaultWiki 4.0.16+ would send emails with invalid unsubscribe links. Does not affect Lite versions.
DiscoveredMarch 15, 2017
ResolvedMarch 30, 2017
Patches Available4.0.17 Patch Level 1
4.0.16 Patch Level 2
4.0.15 Patch Level 6
4.0.14 Patch Level 9
4.0.13 Patch Level 9
4.0.12 Patch Level 10
4.0.11 Patch Level 10
4.0.10 Patch Level 11
WorkaroundIn 4.0.17, use the provided inline moderation controls to unsubscribe all users from any content that was imported from VaultWiki 4.0.16+, or use the following MySQL queries to unsubscribe all users from all content:
Code:
TRUNCATE TABLE vw_subscribe;
TRUNCATE TABLE vw_subscribelog;
UPDATE vw_usercount SET vw_subscribed = 0;
The versions listed below are known to be affected by this issue. If you are using one of those versions, you should update to a newer release that has no known vulnerabilities.

Notes

The patches prevent new imports from generating invalid unsubscribe links in future emails. For already-affected imports, use one of the provided workarounds.