Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 13 Jul 2017 23:23:37 +0700
From: Maxim Solodovnik <solomax@...che.org>
To: Openmeetings user-list <user@...nmeetings.apache.org>, dev <dev@...nmeetings.apache.org>, 
	security@...nmeetings.apache.org, 
	Joe Basirico <jbasirico@...urityinnovation.com>, 
	Sharath Unni <sunni@...urityinnovation.com>, 
	Dinesh Shetty <dshetty@...urityinnovation.com>, oss-security@...ts.openwall.com, 
	bugtraq@...urityfocus.com
Subject: CVE-2017-7666 - Apache OpenMeetings Missing Secure Headers

Severity: High

Vendor: The Apache Software Foundation

Versions Affected: Apache OpenMeetings 1.0.0

Description: Apache Openmeetings is vulnerable to Cross-Site Request
Forgery (CSRF) attacks, XSS attacks, click-jacking, and MIME based
attacks
CVE-2017-7666

The issue was fixed in 3.3.0
All users are recommended to upgrade to Apache OpenMeetings 3.3.0

Credit: This issue was identified by Security Innovation

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ