Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 20 Jan 2017 07:20:33 +0000 (UTC)
From: Sébastien Delafond <seb@...ian.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: cgiemail multiple vulnerabilities

Hello,

the Debian security team would like to request CVEs for the following
vulnerabilities in cgiemail, all discovered by the cPanel Security Team,
and made public in their TSR-2017-0001 advisory[0]:

  * SEC-212 Format string injection

    The ability to supply arbitrary format strings to cgiemail and
    cgiecho allowed code execution whenever a user was able to provide a
    cgiemail template file.
    
  * SEC-214 Open redirect

    The cgiemail and cgiecho binaries served as an open redirect due to
    their handling of the “success” and “failure” parameters.

  * SEC-215 HTTP header injection

    The handling of redirects in cgiemail and cgiecho did not protect
    against the injection of additional HTTP headers.

  * Reflected XSS vulnerability

    The "addendum" parameter was reflected without any escaping in
    success and error messages produced by cgiemail and cgiecho.

Cheers,

--Seb

[0] https://news.cpanel.com/tsr-2017-0001-full-disclosure

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ