Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAJmMGNuUqFXcxZKpz36opZ_ZwRKuoUHzGJ4EU4m=Zwqf9RO1RA@mail.gmail.com>
Date: Mon, 4 Jul 2016 17:27:14 +0000
From: Patrick Uiterwijk <puiterwijk@...hat.com>
To: oss-security@...ts.openwall.com
Subject: [CVE-2016-1000007] Pagure: XSS in raw file endpoint

CVE-2016-1000007: Pagure XSS in raw file endpoint

Versions affected: 2.2.1 and earlier
Fixed in versions: 2.2.2

Description:
It was found that Pagure served files in user repositories from its
raw endpoint with content types
that instructed the browser to parse HTML files which could lead to
Cross-Site Scripting attack.

Mitigation:
Users of Pagure should update to version 2.2.2 or later.

Credit:
This issue was discovered by Patrick Uiterwijk of Red Hat.

Upstream patch:
https://pagure.io/pagure/c/070d63983fe5daef92005ea33d3b8c693c224c77

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.