![]() |
|
Date: Fri, 11 Jul 2014 03:11:22 -0400 (EDT) From: cve-assign@...re.org To: mmcallis@...hat.com, vkaigoro@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: XSS in PNP4Nagios -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Jun 04, 2014 This issue was detected by Peter Osterberg > https://github.com/lingej/pnp4nagios/commits/master/share/pnp/application/views/kohana_error_page.php > https://github.com/lingej/pnp4nagios/commit/f846a6c9d007ca2bee05359af747619151195fc9 > http://sourceforge.net/p/pnp4nagios/code/ci/f846a6c9d007ca2bee05359af747619151195fc9 > - <p><?php echo $message ?></p> > + <p><?php echo html::specialchars($message) ?></p> Use CVE-2014-4907. > Jun 13, 2014 pnp/views/kohana_error_page: plug another XSS hole > https://github.com/lingej/pnp4nagios/commits/master/share/pnp/application/views/kohana_error_page.php > https://github.com/lingej/pnp4nagios/commit/e4a19768a5c5e5b1276caf3dd5bb721a540ec014 > Jun 13, 2014 Plug potential XSS hole in views/template.php > https://github.com/lingej/pnp4nagios/commits/master/share/pnp/application/views/template.php > https://github.com/lingej/pnp4nagios/commit/cb925073edeeb97eb4ce61a86cdafccc9b87f9bb Use CVE-2014-4908 for both e4a19768a5c5e5b1276caf3dd5bb721a540ec014 and cb925073edeeb97eb4ce61a86cdafccc9b87f9bb. These are both <meta http-equiv="refresh" content="[INSERT_NUMBER_HERE]; url=<?php echo $_SERVER['REQUEST_URI'] ?>"> issues. We realize that it is possible that e4a19768a5c5e5b1276caf3dd5bb721a540ec014 was reported by an external researcher, and cb925073edeeb97eb4ce61a86cdafccc9b87f9bb was discovered internally by the vendor, but there is apparently no available information confirming that. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJTv41fAAoJEKllVAevmvms0VQH/iq8EixcjtpNl7VYMISM8NBj 9bBx5ECqlgGYgjB2hLqo2ZjoHZ4BwSLsDfMA3WYdj/ikdO/JsAnULog2My3/3HR3 uNjT7RolRcWXAZH1hiL9xIbLthewmaSeoxaV0Maa6NiV4UVBYJknsAAA4coVFMFe +fCt1QjnkKNzNriGEMIen/k3fkYg8AUCbNvZIs6MznORjPq57MMu6MTbU/Pz0q8I AMfpkOH55PdGjKUhtOzquV1z3qrp97I29sKYAP04iFZgBQyn/u0CcPO2LWTqiigC +scaKEROyGq/XzvsbcFtTUedhfx+isnlh2OixUDv6SI3oGBWhVQmmFLbuWC/b4Q= =TZ2O -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.