Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <51187856.3040205@redhat.com>
Date: Sun, 10 Feb 2013 21:49:26 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Raphael Geissert <geissert@...ian.org>,
        Mitre CVE assign department <cve-assign@...re.org>
Subject: Re: CVE request: piwigo XSS in password.php

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/09/2013 06:14 PM, Kurt Seifried wrote:
> So Henri Salo pointed out that I never assigned a CVE for this:
> 
> http://www.openwall.com/lists/oss-security/2012/10/06/2
> 
> Which raises a good note: do not be afraid to bug me if some time
> goes by without an answer or at least a reply/question.
> 
>> Hi,
> 
>> A XSS vulnerability has been reported in piwigo's password.php 
>> before 2.4.4: http://piwigo.org/bugs/view.php?id=0002750 
>> http://secunia.com/advisories/50510/
> 
>> However, as stated in the Secunia advisory, the fix does not 
>> entirely address the issue. For context, the 
>> stripslashes/strip_tags'ed POST variable is included in the 
>> template as following: <input type="text" id="username_or_email" 
>> name="username_or_email" ... value="{$username_or_email}">
> 
>> (some parts redacted for clarity)
> 
>> So, two ids are needed. Thanks in advance.
> 
>> Piwigo 2.3.1 also seems to be affected but 2.1.2 doesn't.
> 
>> -- Raphael Geissert - Debian Developer www.debian.org - 
>> get.debian.net
> 
> Please use CVE-2012-6126 for this issue.

Someone (who wishes to remain anonymous, but they rock!) pointed out
that this was already assigned:

http://seclists.org/oss-sec/2012/q4/98

Please REJECT CVE-2012-6126 and use CVE-2012-4525/CVE-2012-4526 as
mentioned above instead. Thanks to my anonymous benefactor.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=3Bp6
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.