|
Message-ID: <4e04d782-268e-46bf-f74e-06696f5bdc7a@chbi.eu>
Date: Sat, 7 Oct 2017 08:56:48 +0200
From: chbi@...i.eu
To: oss-security@...ts.openwall.com
Subject: Stored XSS vulnerabilities in Flyspray
Hi,
I've discovered two security issues in Flyspray (http://www.flyspray.org/)
A stored XSS vulnerability in Flyspray before 1.0-rc6 allows an
authenticated user to inject JavaScript to gain administrator privileges.
Fix:
https://github.com/Flyspray/flyspray/commit/754ec5d04348ef7ecb8cb02ade976dc412b031f8
A stored XSS vulnerability in Flyspray between 1.0-rc4 and 1.0-rc6
allows an authenticated user to inject JavaScript to gain administrator
privileges and also to execute JavaScript against other users (including
unauthenticated users).
Fix
https://github.com/Flyspray/flyspray/commit/00cfae5661124f9d67ac6733db61b2bfee34dccc
Both issues are fixed in Flyspray 1.0-rc6.
https://github.com/Flyspray/flyspray/releases/tag/v1.0-rc6
I've requested CVE IDs (MITRE).
--
chbi
https://chbi.eu
GPG: 3DE9 9187 4BE9 EAE6 3CA8 DC20 BA7B 93F9 9037 AE7E
https://chbi.eu/chbi.asc
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.