Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 11 Jan 2015 22:09:30 +0000
From: Daniel Strøm <ds@...4web.dk>
To: cve-assign@...re.org, Daniel Strøm <ds@...4web.dk>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE request

Thank you very much :)


On Sun Jan 11 2015 at 3:41:04 PM <cve-assign@...re.org> wrote:

>
> > I'd like a CVE for the following security issue:
> > https://github.com/ZF-Commons/ZfcUser/issues/550
> >
> > And in text:
> > Security advisory: XSS vulnerability in login redirect param
> >
> > ZfcUser version 1.2.2 has been released and includes a security for this
> > vulnerability. Fix has been applied in @baf0e46
> > <https://github.com/ZF-Commons/ZfcUser/commit/baf0e460>
> > Affected versions
> >
> > All versions below 1.2.2 are affected. dev-master is fixed starting from
> @
> > 2cc167a <https://github.com/ZF-Commons/ZfcUser/commit/2cc167a>
> > Exploits
> >
> > Because of missing escaping of the URL param redirect a XSS attack is
> > possible.
> > For example: Setting the redirect param to "><a%20href="
> http://github.com
> > ">GitHub.com</a><inpu%20type="hidden"%20" would result in a link added
> to
> > the login page.
> > Resolution
> >
> > If you are using any version of ZfcUser below 1.2.2 please upgrade
> > immediately by running composer update.
> > Credits
> >
> > The vulnerability was discovered and fixed by @GyunerZeki
> > <https://github.com/GyunerZeki>
>
> Use CVE-2015-1039.
>
> ---
>
> CVE assignment team, MITRE CVE Numbering Authority M/S M300
> 202 Burlington Road, Bedford, MA 01730 USA
> [ PGP key available through http://cve.mitre.org/cve/request_id.html ]
>

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ