Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 02 May 2012 19:33:10 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Greg Knaddison <greg.knaddison@...uia.com>
Subject: Re: CVE Request for Drupal contributed modules

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/02/2012 06:53 PM, Greg Knaddison wrote:
> Hello,
> 
> First, thanks to Kurt for getting us CVEs in advance on Drupal
> core's latest release at http://drupal.org/node/1557938 with CVEs
> on each issue.
> 
> This is a CVE request for the following contributed module issues:
> 
> http://drupal.org/node/1558248  SA-CONTRIB-2012-072 - cctags -
> Cross Site Scripting (XSS) http://drupal.org/node/1557874
> SA-CONTRIB-2012-071 - Glossify - Cross Site Scripting (XSS) -
> Unsupported http://drupal.org/node/1557872  SA-CONTRIB-2012-070 -
> Taxonomy Grid : Catalog - Cross Site Scripting (XSS) - Unsupported 
> http://drupal.org/node/1557868  SA-CONTRIB-2012-069 - Addressbook
> - Multiple vulnerabilities - Unsupported 
> http://drupal.org/node/1557852  SA-CONTRIB-2012-068 - Node Gallery
> - Cross Site Request Forgery (CSRF) - Unsupported 
> http://drupal.org/node/1547738  SA-CONTRIB-2012-067 - Linkit -
> Access bypass http://drupal.org/node/1547736  SA-CONTRIB-2012-066 -
> Spaces and Spaces OG - Access Bypass http://drupal.org/node/1547686
> SA-CONTRIB-2012-065 - Sitedoc - Information disclosure 
> http://drupal.org/node/1547674  SA-CONTRIB-2012-064 - Ubercart - 
> Multiple vulnerabilities http://drupal.org/node/1547660
> SA-CONTRIB-2012-063 - RealName - Cross Site Scripting (XSS) 
> http://drupal.org/node/1547520  SA-CONTRIB-2012-062 - Creative
> Commons - Cross Site Scripting (XSS)
> 
> Other issues from 2012 that don't have a CVE per your policies: 
> http://drupal.org/node/1515282  SA-CONTRIB-2012-056 - Janrain
> Engage - Sensitive Data Protection Vulnerability 
> http://drupal.org/node/1506542  SA-CONTRIB-2012-050 - CDN2 Video -
> Unsupported
> 
> Thanks, Greg
> 

Please use the following:

CVE-2012-2154 Drupal SA-CONTRIB-2012-050 - CDN2 Video - XSS
CVE-2012-2155 Drupal SA-CONTRIB-2012-050 - CDN2 Video - CSRF

CVE-2012-2296 Drupal SA-CONTRIB-2012-056 - Janrain Engage - Sensitive
Data Protection Vulnerability

CVE-2012-2297 Drupal SA-CONTRIB-2012-062 - Creative Commons - XSS

CVE-2012-2298 Drupal SA-CONTRIB-2012-063 - RealName - XSS

CVE-2012-2299 Drupal SA-CONTRIB-2012-064 - Ubercart - failure to
encrypt data
CVE-2012-2300 Drupal SA-CONTRIB-2012-064 - Ubercart - XSS
CVE-2012-2301 Drupal SA-CONTRIB-2012-064 - Ubercart - Arbitrary PHP
Execution

CVE-2012-2302 Drupal SA-CONTRIB-2012-065 - Sitedoc - Information
disclosure

CVE-2012-2303 Drupal SA-CONTRIB-2012-066 - Spaces and Spaces OG -
Access Bypass

CVE-2012-2304 Drupal SA-CONTRIB-2012-067 - Linkit - Access bypass

CVE-2012-2305 Drupal SA-CONTRIB-2012-068 - Node Gallery - CSRF

CVE-2012-2306 Drupal SA-CONTRIB-2012-069 - Addressbook - SQL Injection
CVE-2012-2307 Drupal SA-CONTRIB-2012-069 - Addressbook - CSRF

CVE-2012-2308 Drupal SA-CONTRIB-2012-070 - Taxonomy Grid : Catalog - XSS

CVE-2012-2309 Drupal SA-CONTRIB-2012-071 - Glossify - XSS

CVE-2012-2310 Drupal SA-CONTRIB-2012-072 - cctags - XSS



- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=FovE
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.