Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 4 Jul 2016 17:27:14 +0000
From: Patrick Uiterwijk <>
Subject: [CVE-2016-1000007] Pagure: XSS in raw file endpoint

CVE-2016-1000007: Pagure XSS in raw file endpoint

Versions affected: 2.2.1 and earlier
Fixed in versions: 2.2.2

It was found that Pagure served files in user repositories from its
raw endpoint with content types
that instructed the browser to parse HTML files which could lead to
Cross-Site Scripting attack.

Users of Pagure should update to version 2.2.2 or later.

This issue was discovered by Patrick Uiterwijk of Red Hat.

Upstream patch:

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ