Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 21 Dec 2010 23:27:46 -0600
From: Raphael Geissert <>
Subject: Re: CVE Request -- MHonArc: Improper escaping of certain HTML sequences (XSS)

Earl Hood wrote:
> With that said, do have an available patch that fixes
> the problem?
> If not, I can look into it during the holiday break to
> get a fix for it.  Note, even if there is a fix for the
> case you provided, there is no 100% guarantee that there
> could be other data input sequences that get by the filter.
> Hence, those concerned about security disable the
> HTML filter:

Attached patch is a quick way to fix it. It increases the processing time 
(it has to run filter() at least twice per message,) but ensures that no 
undesired html is returned (unless one of the existing routines misses 

What do you think about it?

Raphael Geissert - Debian Developer -

View attachment "mhonarc.CVE-2010-4524.patch" of type "text/x-patch" (710 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.