Attention Folio System Operators,


The following releases have been made to patch the aforementioned critical security vulnerabilities:

·         mod-data-export-spring-2.0.2 (Orchid)

·         mod-data-export-spring-1.5.4 (Nolana)

·         mod-remote-storage-2.0.3 (Orchid)

·         mod-remote-storage-1.7.2 (Nolana)

 

Remediation instructions:

1.    For your flower release configure the new mod-data-export-spring and mod-remote-storage versions, you MUST set the SYSTEM_USER_PASSWORD environment variable. Avoid using values which are easy to guess, such as the module name or the system username.

2.    Deploy the new module versions.

3.    For each tenant $TENANT migrate to the new module version:

1.    For Orchid: curl -d '[{"id":"mod-data-export-spring-2.0.2","action":"enable"},{"id":"mod-remote-storage-2.0.3","action":"enable"}]' http://$OKAPI:9130/_/proxy/tenants/$TENANT/install?reinstall=true

2.    For Nolana: curl -d '[{"id":"mod-data-export-spring-1.5.4","action":"enable"},{"id":"mod-remote-storage-1.7.2","action":"enable"}]' http://$OKAPI:9130/_/proxy/tenants/$TENANT/install?reinstall=true

1.    For each tenant verify that the patch has been successfully applied: Go to the UI and try to login. Use the default username data-export-system-user and system-user (for remote-storage) and the new password. NOTE: These system users do not have UI permissions, so once you log in, you won't be able to do anything in the UI/stripes. It's sufficient to check that you're able to authenticate.

2.    You may also want to check the logs for these two modules for any entries which might indicate a problem.

 

N.B. If you specify a non-default system username by setting SYSTEM_USER_NAME you MUST manually disable or delete the existing system user with the default username.

N.B. After changing SYSTEM_USER_PASSWORD or SYSTEM_USER_NAME it is NOT sufficient to only redeploy the module; you also MUST reinstall the module as show above.
N.B. Disabling an affected module is NOT sufficient to fix the vulnerability.

 

System operators are advised to immediately apply this fix for both modules.

-Folio Security Team

 

 

From: Craig McNally
Sent: Tuesday, July 18, 2023 4:17 PM
To: sysops-sig@ole-lists.openlibraryfoundation.org
Subject: RE: Folio - Critical Security Vulnerabilities

 

Attention Folio System Operators,

 

Related to the notice sent yesterday about critical security vulnerabilities, we now have more information on when patch releases will be available.  Both releases are expected to be available Thursday (July 20, 2023).

 

Announcements will be made once releases are available.

 

System operators are advised to apply these fixes ASAP.

 

-Folio Security Team

 

From: Craig McNally
Sent: Monday, July 17, 2023 5:33 PM
To: sysops-sig@ole-lists.openlibraryfoundation.org
Subject: Folio - Critical Security Vulnerabilities

 

Attention Folio System Operators,

 

Two critical security vulnerabilities have recently been discovered in Folio.  Due to the severity and exploitability of these vulnerabilities, they have been embargoed.  As such, details cannot be provided at this time.  The Folio Security Team is sending this notification to inform you that fixes are being worked on and two critical service patch (CSP) releases will soon be available for both Orchid and Nolana.  Exact timing of the releases is TBD, but the first, which addresses the more critical of the two vulnerabilities may be available as soon Wednesday July 19, 2023.  We strongly suggest that these patches are applied as soon as possible.  Unfortunately, there are no known workarounds at this time aside from disabling the affected modules.

 

Another notification will be sent once the first CSP release is available.  Full details of the vulnerabilities will not be disclosed until a reasonable amount of time has passed, providing system operators with sufficient time to apply the patches.

 

-Folio Security Team