Security Advisory - Staff Permission Escalation
Affected Versions
Versions 3.0.0 through 3.0.8, and 3.1.0 are affected.
Description
Active and valid staff members may be able to gain additional permissions through crafted URLs. Because this issue requires that the user have an active and valid staff member account, this is classified as a Moderate vulnerability. Patch release 3.0.9 and 3.1.1 corrects this vulnerability.
Resolution
If you are running 3.0.x upgrade to version 3.0.9. If you are running 3.1.0 upgrade to version 3.1.1.
Related tasks:
- CORE-1045
Credits
CORE-1045 was discovered by Nerijus Barauskas at NGnTC.
Related Tags:
Blesta 3.0.8 Patch Released
A patch has been released for Blesta that addresses bugs discovered since 3.0.7 was released. As usual, a big thanks to everyone who reported and confirmed these bugs on our forums, we appreciate your help.
You can read more information about this patch, including the release notes, on our forums at http://www.blesta.com/forums/index.php?/topic/1812-release-308/
Download Link
To patch your installation, please follow the instructions for Patching an Existing Install from our user manual. (Or, wait a little while, I hear 3.1 may be out later today!)
Blesta 3.1: Now Available
We’re excited to announce the release of Blesta 3.1. Thanks to everyone who participated in the beta!
Then, check out the docs to install or upgrade.
This release is packed with many new features, but perhaps the most prominent is configurable options. For a quick overview of configurable options, please watch the following short video:
What else is new in 3.1?
Modules
- Proxmox
- VPS.NET
- Enom
- GoGetSSL
- TheSSLStore
Gateways
- BitPay
- CCAvenue
- Payza
Plugins
- Shared Login
Core features include configurable options, package sorting, support staff signatures, cancel end of term package option, and many more. Please see the changelog for a full list.
So what’s next?
Development on 3.2 is in full swing. Rumor has it, a responsive bootstrap client interface is on the way.. among other things.
Related Tags:
New for Developers in 3.1
Blesta 3.1 is loaded with great new features, but we didn’t forget about developers either. Here are a few new items developers can take advantage of in 3.1.
Improved CLI Installer
The command line installer gets non-interactive mode support in 3.1. This allows integration services to automate installation of Blesta. Read more about CLI installation.
Extensions Simplified
Plugins, Modules, and Gateways now support a config.json file that defines basic details such as author, name, version, and more. This greatly reduces the redundancy and maintenance across extensions, simplifying the development process. See configuration for Plugins, configuration for Modules, and configuration for Gateways for more details.
New Events
Almost a dozen new events have been added in 3.1. Of course, every event added opens up endless possibilities for new Plugins. See all events here.
Updated API
New features equals new and updated API commands (including Plugins). Check out the source code documentation.
Version 3.1 is currently in beta with a final release due out this week.
Related Tags:
Blesta 3.0.7 Patch Released
A patch has been released for Blesta that addresses bugs discovered since 3.0.6 was released. It also includes three security fixes, two of which were discovered as part of our internal review process. While these issues have a low to moderate impact rating, we strongly recommend upgrading to 3.0.7.
You can read more information about this patch, including the release notes, on our forums at http://www.blesta.com/forums/index.php?/topic/1660-release-307/ A patch has been released for Blesta that addresses bugs discovered since 3.0.6 was released. It also includes three security fixes, two of which were discovered as part of our internal review process. While these issues have a low to moderate impact rating, we strongly recommend upgrading to 3.0.7.
You can read more information about this patch, including the release notes, on our forums at http://www.blesta.com/forums/index.php?/topic/1660-release-307/
Download Link
To patch your installation, please follow the instructions for Patching an Existing Install from our user manual.