Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 27 Feb 2015 11:44:45 +0100
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: Re: Re: CVE request: Joomla Google Maps Plugin

On Thu, 26 Feb 2015 14:43:19 -0500 (EST)
cve-assign@...re.org wrote:

> Finally, the researcher disclosed one new finding in 2014 in the
> http://seclists.org/fulldisclosure/2014/Feb/53 post. This new finding
> is a variant of CVE-2013-7428, but applies specifically to the case
> where the attacker controls a subdomain of the victim's domain name.
> Use CVE-2014-9686. The researcher gives an apparently realistic
> example in which the attacker controls site.wordpress.com and the
> attack target is the wordpress.com web site.

Now this is interesting because these issues seem to be unfixed.

Anyone knows anything? I'll try to get in contact with the upstream
developer about this.

-- 
Hanno Böck
http://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: BBB51E42

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ