Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <50342023.8090903@redhat.com>
Date: Tue, 21 Aug 2012 17:56:19 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>, Benny Baumann <BenBE@...hi.org>,
        Benny Baumann <BenBE@...rphia.de>, Nigel McNie <nigel@...hi.org>
Subject: Re: CVE Request -- php-geshi / GeSHi (1.0.8.11): Remote
 directory traversal and information disclosure in the cssgen contrib module
 (plus possibly XSS, but it needs upstream to confirm)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/21/2012 09:05 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, Ben, Nigel, vendors,
> 
> Issue #A: --------- A directory traversal and information
> disclosure (local file inclusion) flaws were found in the cssgen 
> contrib module (application to generate custom CSS files) of GeSHi,
> a generic syntax highlighter, performed sanitization of
> 'geshi-path' and 'geshi-lang-path' HTTP GET / POST variables. A
> remote attacker could provide a specially-crafted URL that, when
> visited could lead to local file system traversal or, potentially,
> ability to read content of any local file, accessible with the
> privileges of the user running the webserver.
> 
> References: [1]
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685324 [2]
> https://bugzilla.redhat.com/show_bug.cgi?id=850425
> 
> Upstream patch: [3]
> http://geshi.svn.sourceforge.net/viewvc/geshi?view=revision&revision=2507

Please
> 
use CVE-2012-3521 for this issue.

> Issue #B: --------- Then there is a report about non-persistent XSS
> flaw, that have been fixed in the contrib module of 1.0.8.11
> version too: [4]
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685323
> 
> but I was unable to find the relevant upstream patch (and above
> Debian BTS entry doesn't contain further information too, which
> could be acted upon).
> 
> Thus I am Cc-in GeSHi upstream to this post to shed the light on
> the XSS flaw [4].
> 
> Ben, Nigel, could you please clarify what was the relevant upstream
> patch for the Debian BTS#685323 / Non-persistent XSS vulnerability
> in contrib script [4] issue? Thank you for that, Jan.
> 
> Kurt, once the second issue clarified, could you allocate CVE ids
> for these?
> 

> The fix is: 
> http://geshi.svn.sourceforge.net/viewvc/geshi?view=revision& 
> revision=2508
> 
> Cheers, -- Raphael Geissert - Debian Developer www.debian.org -
> get.debian.net

Please use CVE-2012-3522 for this issue.



> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team
> 
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=tO+2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.