|
Message-ID: <51076E3E.4050905@redhat.com> Date: Mon, 28 Jan 2013 23:37:50 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Moritz Naumann <security@...itz-naumann.com> Subject: Re: CVE Request: XSS in Elgg 1.8.12, 1.7.16 (core module "Twitter widget") -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 01/28/2013 05:15 PM, Moritz Naumann wrote: > Hi, > > Elgg [1], versions 1.8.12 and 1.7.16 and earlier, bears a > persistent script injection vulnerability in its core module > "Twitter widget", which allows for XSS attacks. > > On installations which have the Twitter widget activated (disabled > by default, but in use on many installations), any authenticated > user may add the Twitter widget to their activity / dashboard page. > Editing its configuration allows the user to set the > twitter_username parameter. The value stored in this parameter will > be echoed without sanitation [2] when the users' activity / > dashboard page is requested (by the same or any other user, > authenticated or not). > > According to changes committed [3] to their Git repository Elgg > developers will provide a fix for this issue in the upcoming (?) > 1.8.13 release. > > Reported by: Moritz Naumann http://moritz-naumann.com > > A CVE ID has, to my knowledge, not yet been assigned. Secunia has > assigned it SA52007. > > A slightly more complete advisory should hit FD and Bugtraq any > minute. > > Thanks, > > Moritz > > [1] http://elgg.org/ [2] > http://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21 > > [3] > http://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11 Please > use CVE-2013-0234 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRB24+AAoJEBYNRVNeJnmTFlgP/2jFTtmzOwILfjUVaRwNN5Ik e8trVYZZsnw/V+JL40ewD/2RboWx1WoPwDvF0zVSjXNdFWX6pm4jdWZ5BbTI9gE7 i+qXbJIu/GnxuuZdzZm3ApVlHvvKidmCM8hhFm4TEGaSHuuv44V87iPumoq5Wfwq qnjAKzwLNZK1w6SapvO0PjT7GHszgjvfcVQG9E2FQoAvWqYmu9ZEY7/YIooRrG9m S35Oqc8f5/H4YveqJcpQvfTEpoQRiHDzoU/48JBN28pfQlJ/wzWdV6cgjcFmRfQB Hej5PJyoM9ItAz1955X46t2J5mwFPBwtB5iiDj6Ta7790+sfyAt0JcW1MecfFc4n swIpJXxKnTpTK6+MyBTRGXr/NCC0DI3LjxkU8kVxdcBfaVkzYiA9funa+yySfq6r 56CuwFTDQsvVNJYqACVkpN9sEBKw4dq+1Lb/EXA/2GzHuyKLN0oJtFevjv7Zt0hh fSEI67dABS02tbPmKUBTUvFKhC4HTRm/Tqtir04A34FgKtv6H3+GnkzDLTVzx6VV JEDKQoIPBboGuxwpsWUfJ8fJQlbxvS45RNbdv2ZUUMa/OI6j6WsOCeQb+QKoZCbo mlB0rbGxrnLuVd7hLSLEpvetsz+gJloEsgaogo02icEdga6j1ARYGEnXd0kVcgrT TMf84SPAaJh4HXPzWPj/ =4nBC -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.