Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 04 Jun 2013 12:54:28 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- Gallery < 3.0.8 - Improper stripping
 of URL fragments in uploadify and flowplayer SWF files might lead to replay
 attacks

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/04/2013 06:51 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
> 
> Gallery 3 upstream has released v3.0.8 version: [1]
> http://sourceforge.net/mailarchive/message.php?msg_id=30925931 [2]
> http://galleryproject.org/gallery_3_0_8
> 
> correcting one security flaw (or two if you would consider
> uploadify and flowplayer SWF files as two separate cases):
> 
> A security flaw was found in the way uploadify and flowplayer SWF
> files handling functionality of Gallery version 3, an open source
> project with the goal to develop and support leading photo sharing
> web application solutions, processed certain URL fragments passed
> to these files (certain URL fragments were not stripped properly
> when these files were called via direct URL request(s)). A remote
> attacker could use this flaw to conduct replay attacks.

uploadify/flowplayer are def different upstream projects, but the
flaws are appear to be the same basic type and same researcher, so CVE
MERGE

> Relevant upstream tickets (and patches): * uploadify case: [3]
> http://sourceforge.net/apps/trac/gallery/ticket/2068 [4]
> https://github.com/gallery/gallery3/commit/80bb0f2222dd99ed2ce59e804b833bab63cc376a
>
>
> 
* flowplayer case:
> [5] http://sourceforge.net/apps/trac/gallery/ticket/2070 [6]
> https://github.com/gallery/gallery3/commit/3e5bba2cd4febe8331c0158c11ea418f21c72efa
>
> 
[7]
https://github.com/gallery/gallery3/commit/12e51694fdc39c752cc439424cf309866f9f914a

Please use CVE-2013-2138 for this issue.

> References: [8] https://bugzilla.redhat.com/show_bug.cgi?id=970596
> 
> Could you allocate a CVE id for this?
> 
> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=k1aT
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ