Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 11 Jul 2014 03:11:22 -0400 (EDT)
From: cve-assign@...re.org
To: mmcallis@...hat.com, vkaigoro@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: XSS in PNP4Nagios

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Jun 04, 2014 This issue was detected by Peter Osterberg
> https://github.com/lingej/pnp4nagios/commits/master/share/pnp/application/views/kohana_error_page.php
> https://github.com/lingej/pnp4nagios/commit/f846a6c9d007ca2bee05359af747619151195fc9
> http://sourceforge.net/p/pnp4nagios/code/ci/f846a6c9d007ca2bee05359af747619151195fc9

> - <p><?php echo $message ?></p>
> + <p><?php echo html::specialchars($message) ?></p>

Use CVE-2014-4907.



> Jun 13, 2014  pnp/views/kohana_error_page: plug another XSS hole
> https://github.com/lingej/pnp4nagios/commits/master/share/pnp/application/views/kohana_error_page.php
> https://github.com/lingej/pnp4nagios/commit/e4a19768a5c5e5b1276caf3dd5bb721a540ec014

> Jun 13, 2014  Plug potential XSS hole in views/template.php
> https://github.com/lingej/pnp4nagios/commits/master/share/pnp/application/views/template.php
> https://github.com/lingej/pnp4nagios/commit/cb925073edeeb97eb4ce61a86cdafccc9b87f9bb

Use CVE-2014-4908 for both e4a19768a5c5e5b1276caf3dd5bb721a540ec014
and cb925073edeeb97eb4ce61a86cdafccc9b87f9bb. These are both

  <meta http-equiv="refresh" content="[INSERT_NUMBER_HERE]; url=<?php echo $_SERVER['REQUEST_URI'] ?>">

issues. We realize that it is possible that
e4a19768a5c5e5b1276caf3dd5bb721a540ec014 was reported by an external
researcher, and cb925073edeeb97eb4ce61a86cdafccc9b87f9bb was
discovered internally by the vendor, but there is apparently no
available information confirming that.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTv41fAAoJEKllVAevmvms0VQH/iq8EixcjtpNl7VYMISM8NBj
9bBx5ECqlgGYgjB2hLqo2ZjoHZ4BwSLsDfMA3WYdj/ikdO/JsAnULog2My3/3HR3
uNjT7RolRcWXAZH1hiL9xIbLthewmaSeoxaV0Maa6NiV4UVBYJknsAAA4coVFMFe
+fCt1QjnkKNzNriGEMIen/k3fkYg8AUCbNvZIs6MznORjPq57MMu6MTbU/Pz0q8I
AMfpkOH55PdGjKUhtOzquV1z3qrp97I29sKYAP04iFZgBQyn/u0CcPO2LWTqiigC
+scaKEROyGq/XzvsbcFtTUedhfx+isnlh2OixUDv6SI3oGBWhVQmmFLbuWC/b4Q=
=TZ2O
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ