Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <524AF33A.9030501@redhat.com>
Date: Tue, 01 Oct 2013 10:07:22 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>
Subject: Re: CVE request: Simple Machines Forum (SMF) <= 2.0.5
 - multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/01/2013 12:23 AM, Henri Salo wrote:
> On Wed, Sep 25, 2013 at 12:07:32PM -0600, Kurt Seifried wrote:
>> On 09/25/2013 10:45 AM, Henri Salo wrote:
>>> On Wed, Sep 25, 2013 at 02:33:14PM +0000, Moritz Naumann
>>> wrote:
>>>> This CSRF doesn't work for me on two 2.0.4 installations I
>>>> tested on.
>>> 
>>> You are correct.
>>> 
>>>> Both return Unable to verify referring url. Please go back
>>>> and try again.
>>> 
>>> Actual error message for me:
>>> 
>>> "Your session timed out while posting. Please go back and try 
>>> again."
>>> 
>>> I'm really sorry about this. I even tested using different
>>> computer so I don't know what I previously did wrong/different.
>>> Thank you for correcting this.
>>> 
>>> --- Henri Salo
>>> 
>> 
>> So to confirm: the XSS are legit, the CSRF is confirmed to not
>> work? thanks.
> 
> Can we get these assigned or do you have open questions, thanks.
> 
> --- Henri Salo

Apologies for the delay. Please use CVE-2013-4395 for the XSS vuln.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iQIcBAEBAgAGBQJSSvM6AAoJEBYNRVNeJnmTBOkP/jqGXYbN+ZSMT1R8hGpUr1kN
ZO457FI7N8nhSsikecIgY9bnuEb0rTEQ3JYzsrPOWPNXwpkyzAr95LWXQQCfY92W
RgYd6kilcqY1ydJz2/wV050nOm16vcHHbq4/oZ/HtRjIchMtS/PIhdKzV1o8Pwcl
DWWqyv3lDl9wcnWBHPoJHcxh7oVI0DKTgDCK1pRhX7U2Z/mJ9DTR6bgFakZOiXYb
67jYSFX8Jx3MB94u7Ol51TtbNbiurGfesJ1EgCcYcezAreV55IobJ7ynCjV1hm8u
hbCVfMncTphggEX0kKb81tmPLQhnNrb8hhYeK+Q3T7gl/j9jcRDT5Z8VnwfzEBJZ
mHZQNBWVplBLeFcUKaD6n8r4GaOexkZa3byqBc4pUZGtKTLAfI0ayxbfhF+b/uap
3EO5ecNTzL5Ajm0zL++tlrJhTBpuvsceBqk+NTXCFrsCjnLjmTrIFp7SBieFsXXT
pU3vkdb/Oxf+i4LXKgwB4PUX90HhgXAQ4On0LmGLYHIoxIuKlW0Q2uD8fo39PrWl
9dtv2wjtZ3wTXDNE/Ovqeqgr4K7aNd64SZ3yVGMU5cQRObjTZSU19IvTnl8UCtXu
ruNsNQmbwirEuo/DXJAyx8Squ67pCP731C4ZFKkqBwYD9cQH9D/iYQXf4x9e4wqB
/lio2kWyNK8QBB2mrHR7
=v7nS
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.