Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri,  4 Dec 2015 23:42:56 -0500 (EST)
From: cve-assign@...re.org
To: ryandewhurst@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Magento SWF XSS

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> http://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/
> 
> DOM based Cross Site Scripting (XSS)
>
> http://[magento_url]/skin/adminhtml/default/default/media/editor.swf
> http://[magento_url]/skin/adminhtml/default/default/media/uploader.swf
> http://[magento_url]/skin/adminhtml/default/default/media/uploaderSingle.swf
> 
> editor.swf?bridgeName=[XSS]

Use CVE-2014-9758. Often "uploader.swf" XSS reports for various
products are a consequence of uploader.swf in old versions of YUI,
e.g., CVE-2013-4941. As far as we know, YUI did not ever include
editor.swf or uploaderSingle.swf files. We don't know of any
relationship between any Magento .swf file and any YUI .swf file, and
therefore there is a new CVE. For reference, other .swf filenames
associated with YUI 2.x are YUIBridgeProject.swf, charts.swf,
connection.swf, datastore.swf, and swfstore.swf.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Eg7t
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ