Name | CVE-2019-14511 |
Description | Sphinx Technologies Sphinx 3.1.1 by default has no authentication and listens on 0.0.0.0, making it exposed to the internet (unless filtered by a firewall or reconfigured to listen to 127.0.0.1 only). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 939762 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
sphinxsearch (PTS) | stretch (security), stretch (lts), stretch | 2.2.11-1.1+deb9u1 | vulnerable |
| buster (security), buster, buster (lts) | 2.2.11-2+deb10u1 | vulnerable |
| sid, trixie, bookworm | 2.2.11-8 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
sphinxsearch | source | wheezy | (unfixed) | end-of-life | | |
sphinxsearch | source | (unstable) | 2.2.11-4 | unimportant | | 939762 |
Notes
Issue is just with the default configuration, but can be easily reconfigured
to listen on localhost only. sphinxsearch will not be started automatically
and an admin needs first to create anyway a /etc/sphinxsearch/sphinx.conf
starting from a sample.
sphinxsearch should ideally update the defaults in sample configs to bind
listeners to localhost.
This is not treated as a vulnerability, subject to design choices for deployment