|
Message-ID: <n6e47d$hou$1@ger.gmane.org> Date: Mon, 4 Jan 2016 16:47:57 +0100 From: Damien Regad <dregad@...tisbt.org> To: oss-security@...ts.openwall.com Subject: Re: CVE Request: MantisBT SOAP API can be used to disclose confidential settings On 2016-01-03 18:03, cve-assign@...re.org wrote: > In general, a vendor can choose to request a CVE ID for a > vulnerability in beta software. This is unusual and (in cases of many > other products) often not a good idea, but there is no absolute > restriction on having a CVE ID. The reason for requesting a CVE for a beta release is that this code has been out there and used "in production" for several years, despite being "beta" (change was committed [1] in Feb 2010). > Use CVE-2014-9759 for the vulnerability caused by the > master_crypto_salt spelling. Thank you. > There is no CVE ID for the general issue of "Implement a white list of > options . None was needed. The issue, as you correctly interpreted, is the disclosure of the crypto salt. >> Further details available in our issue tracker [3] >> [3] https://mantisbt.org/bugs/view.php?id=20277 > > It currently gives an "Access Denied." error. Apologies, I forgot to make the issue public after releasing the patch. It is available now. [1] https://github.com/mantisbt/mantisbt/commit/eb5623605
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.