Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 30 Jun 2010 18:20:18 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>,
        David Malcolm <dmalcolm@...hat.com>, Kyle VanderBeek <kylev@...ev.com>
Subject: CVE Request -- Python-Mako (prior v0.3.4): Improper escaping of single
 quotes in escape.cgi (XSS)

Hi Steve, vendors,

   Craig Younkins reported:
     [1] http://bugs.python.org/issue9061

   that Python Mako (of versions prior v0.3.4), a template library written in Python,
   improperly escaped single quotes in escape.cgi. An attacker could use this flaw to conduct
   cross-site scripting (XSS) attacks.

   References:
     [2] http://www.makotemplates.org/CHANGES

Sample public PoC (from [1]):

   Proof of concept:
   print """<body class='%s'></body>""" % cgi.escape("' onload='alert(1);'
bad='")

Could you allocate a CVE id for this?

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.