Date: Thu, 19 Jan 2012 13:12:10 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org>, Jan-Wijbrand Kolman <janwijbrand@...il.com> CC: oss-security@...ts.openwall.com, Tres Seaver <tseaver@...ladion.com>, Zope Security Team <security-response@...e.org>, Radek Steiger <rsteiger@...hat.com>, Jan Pokorny <jpokorny@...hat.com> Subject: CVE-2011-4924 assignment notification -- Zope2, Zope3: Incomplete upstream fix for CVE-2010-1104 issue Hello vendors, originally, Common Vulnerabilities and Exposures assigned an identifier CVE-2010-1104 to the following vulnerability: Cross-site scripting (XSS) vulnerability in Zope 2.8.x before 2.8.12, 2.9.x before 2.9.12, 2.10.x before 2.10.11, 2.11.x before 2.11.6, and 2.12.x before 2.12.3 allows remote attackers to inject arbitrary web script or HTML via vectors related to error messages. Later the applied upstream patch was found to be incomplete. The CVE identifier of CVE-2011-4924 has been assigned to this incomplete fix with the issue description as follows: A cross site scripting (XSS) flaw was found in the way Zope2 and Zope3 performed error messages sanitization. If a remote attacker could trick a user, who was logged into Zope2, into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of user's Zope2 session. If a remote attacker could trick a user, who was logged into Zope3, into examining error entries for particular Zope3 instance, it would lead to arbitrary web script execution in the context of user's Zope3 session. Credit: Issue has been discovered by Radek Steiger of Red Hat. References:  https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4924 Zope2 fixes relevant information: ================================= Zope2 v2.12.22 and Zope2 v2.13.12 hotfix announcement:  https://mail.zope.org/pipermail/zope-dev/2012-January/043987.html PyPi Zope_Hotfix_CVE_2010_1104 1.0 reference:  http://pypi.python.org/pypi/Products.Zope_Hotfix_CVE_2010_1104 Zope2 Hotfix_CVE_2010_1104 SVN entries:  http://svn.zope.org/Products.Zope_Hotfix_CVE_2010_1104/?rev=124087&sortby=log#dirlist Zope2 v2.12.22 Changelog:  http://pypi.python.org/pypi/Zope2/2.12.22#id1 Zope2 v2.13.12 Changelog:  http://pypi.python.org/pypi/Zope2/2.13.12#id1 Zope3 fixes relevant information: ================================= New Zope3 zope.error v3.7.3 version has been released to correct this issue:  http://pypi.python.org/pypi/zope.error/3.7.3 Relevant Zope 3 upstream patch:  http://svn.zope.org/zope.error/trunk/?rev=124062&view=rev Jan-Wijbrand Kolman will issue Zope3 zope.error package updates against ZTK v1.0 and v1.1 branches yet. Jan, once this is done, could you list the relevant links here too? (in the reply to this post) Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.