|
Message-ID: <20170120081301.962@usenet.piggo.com> Date: Fri, 20 Jan 2017 07:20:33 +0000 (UTC) From: Sébastien Delafond <seb@...ian.org> To: oss-security@...ts.openwall.com Subject: CVE request: cgiemail multiple vulnerabilities Hello, the Debian security team would like to request CVEs for the following vulnerabilities in cgiemail, all discovered by the cPanel Security Team, and made public in their TSR-2017-0001 advisory[0]: * SEC-212 Format string injection The ability to supply arbitrary format strings to cgiemail and cgiecho allowed code execution whenever a user was able to provide a cgiemail template file. * SEC-214 Open redirect The cgiemail and cgiecho binaries served as an open redirect due to their handling of the “success” and “failure” parameters. * SEC-215 HTTP header injection The handling of redirects in cgiemail and cgiecho did not protect against the injection of additional HTTP headers. * Reflected XSS vulnerability The "addendum" parameter was reflected without any escaping in success and error messages produced by cgiemail and cgiecho. Cheers, --Seb [0] https://news.cpanel.com/tsr-2017-0001-full-disclosure
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.