Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <511B649D.2080704@redhat.com>
Date: Wed, 13 Feb 2013 03:02:05 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>,
        Michel Alexandre Salim <michel+fdr@...vestre.me>,
        Richard Jones <richard@...hanicalcat.net>,
        Ralf Schlatterbeck <rsc@...tux.com>
Subject: Re: CVE Request -- roundup: Multiple XSS flaws plus
 other security related fixes corrected in upstream 1.4.20 version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/10/2012 04:42 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,

Ok some questions/comments inline

> Roundup upstream has released new upstream 1.4.20 version, 
> correcting multiple cross-site scripting (XSS) flaws (and couple of
> other security related issues): [1]
> http://pypi.python.org/pypi/roundup [2]
> https://bugzilla.redhat.com/show_bug.cgi?id=722672
> 
> More from [1] (plus relevant tickets inlined too, where possible to
> find out): 
> --------------------------------------------------------- [A] *
> issue2550729: Fix password history display for anydbm backend, 
> thanks to Ralf Hemmecke for reporting. (Ralf) [3]
> http://issues.roundup-tracker.org/issue2550729

rsc@...tux.com

[A] Doesn't have security implications if roundup is correnctly
configured. The bug would create a python backtrace. Unless the "debug"
option in section [web] is set (which is explicitly discouraged) this
will only display "an error has occurred" in the web-interface. Even if
someone sets the debug option in a production release only the hashed
password could be disclosed. Note that this bug only affects the anydbm
backend which should not be used for a production version either.


> [B] * issue2550684 Fix XSS vulnerability when username contains
> HTML code, thanks to Thomas Arendsen Hein for reporting and patch.
> (Ralf) [4] http://issues.roundup-tracker.org/issue2550684

Please use CVE-2012-6130 for this issue

> [C] * issue2550711 Fix XSS vulnerability in @action parameter, 
> thanks to "om" for reporting. (Ralf) [5]
> http://issues.roundup-tracker.org/issue2550711

Please use CVE-2012-6131 for this issue

> [D] * Fix wrong execute permissions on some files, thanks to Cheer
> Xiao for the patch. (Ralf)

rsc@...tux.com

[D] No security implications: Fixed some permissions on files in
roundup/cgi and locale directories. These are not accessible via the
web-server. So this doesn't constitute a remote vulnerability. Local
users don't gain anything executing these files as no privilege
escalation is involved (they could copy the file which is readable
anyway and make their local copy executable).

> [E] * Fix another XSS with the "otk" parameter, thanks to Jesse
> Ruderman for reporting. (Ralf)

Please use CVE-2012-6132 for this issue

> [F] * Mark cookies HttpOnly and -- if https is used -- secure.
> Fixes issue2550689, but is untested if this really works in
> browsers. Thanks to Joseph Myers for reporting. (Ralf) [6]
> http://issues.roundup-tracker.org/issue2550689

This appears to be security hardening, not a vulnerability, is that
correct?

> [G] * Fix another XSS with the ok- and error message, see
> issue2550724. We solve this differently from the proposals in the
> bug-report by not allowing any html-tags in ok/error messages 
> anymore. Thanks to David Benjamin for the bug-report and to Ezio
> Melotti for several proposed fixes. (Ralf) [7]
> http://issues.roundup-tracker.org/issue2550724

Please use CVE-2012-6133 for this issue

> Cc-ed Ralf Schlatterbeck on this post too to clarify, if issues [A]
> and [D] would also have security implications / IOW if those would
> be security flaws too. Ralf please clarify. Thank you, Jan.
> 
> Could you allocate CVE ids for these (once clarified)?
> 
> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team



- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)

iQIcBAEBAgAGBQJRG2ScAAoJEBYNRVNeJnmTJ8oQAMp2mTStjRiKohBQ05VMfxzp
YHCB4CxfxXQ8Y1KOm76jGcXV/ti+dpLL8guc8UnwzRbdodBcYvzxzIN/y9zYlOby
uPlqdal8i/MIswDHk4vMwt4qh5CKmwZhGHzS6E+qckfjeznwBJJAYOIXU6k4sgUQ
ZZqbeYfv7J2KnDk3eFBq7iWv9gNy2pnsZcgZr/yoxUFWTFR8eVsLDX8fPDEsi/zR
N14lH//p8Q2ejY+cKRR1gRn35L8UOsfC3+EYAt2vhW31Bcwt3HVbo6fojSAYkMqK
YrTSnSAKWvyjZ7imjHlf7i3BNYh3jxUVRdnWyLYp/2Zr0w04wrIzjaxaiXn75T5u
OUj8gNOUPBFvIgfVHP931WPiDQVCNGZ6AM9XkThQhMRoaBqalshb59ukKPZn2j7i
oC72Dgw0iv+wW1N1KBUA/OPMvKIMlvJ/laRDRVpigzOPuRSOrcI0TislTF/YBCp/
TrnQ7XAr2HQPmDUQKRXMzUMLiDdHQFq7nTOqtSZ3jxryE9uWQqG5DehnfHQ/qW1j
b5cLXImV49Y5D2iRgWzsc6MAa9R5w4jryh3BD6WKGE40Zp2YhuZj3b5yXcoNV+9Z
ZOobITtM+gi4vbKTkFkIj8rK8ebWGCyg645XCthi+D4eSNOpq4eqqKKDl3MPgl3q
UN3HD3nphRFZ1iEjxzVb
=dlUe
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.