Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 07 May 2015 22:36:44 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: beaker vulns fixed in version 20.1

So some flaws were found in Beaker and fixed in version 20.1:

https://beaker-project.org/download.html

In Red Hat Bugzilla:

CVE-2015-3160 - 1215020 Beaker is vulnerable to "XXE" attacks from
authenticated  users, due to external entity expansion in job XML

CVE-2015-3161 - 1215024 search bar does not escape </script> tags when
producing JSON

CVE-2015-3162 - 1215030 HTML tags in recipe set comments are not escaped
in the "edit comment" dialog

CVE-2015-3163 - 1215034 anonymous users can modify key types and power types



-- 
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ