Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 15 Jan 2015 16:44:39 -0500
From: Daniel Kahn Gillmor <dkg@...thhorseman.net>
To: Henri Salo <henri@...v.fi>, oss-security@...ts.openwall.com
Subject: Re: CVE-Request -- CMS b2evolution v.5.2.0 -- Reflecting XSS vulnerability in filemanager functionality

Hi Henri--

Your recent message:

On Thu 2015-01-15 01:56:41 -0500, Henri Salo wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Fixed in 5.2.1 version.
>
> - -- 
> Henri Salo
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (GNU/Linux)
>
> iEYEARECAAYFAlS3ZKkACgkQXf6hBi6kbk/EXACgobA8v+eNpA8mbR85uzP1rSH/
> YfEAoMqRuWAaDysP7GYpQJ+zLAkKze+A
> =XgEo
> -----END PGP SIGNATURE-----

Is a bit troubling, because it seems to rely on the Subject: line for
necessary context in interpreting the signed message.

An attacker could take this signed message, and replay it "From" you
with a changed subject line to try to indicate that you think some other
bug was fixed in some other piece of software, version 5.2.1.

You can avoid this kind of problem by ensuring that the messages you
sign are context-independent (e.g. including the information currently
in this message's subject line in your message body directly as well).

Regards,

   --dkg

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ