Date: Mon, 27 Aug 2012 11:50:31 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Bruno Kleinert <fuddl@...ian.org>, mtgap@...cloud.com, security@...cloud.com Subject: Re: ownCloud - matching CVEs to fix information and vice versa -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Just a reminder, if someone from owncloud could sort this tangle out I can assign CVE's for the various issues. On 08/10/2012 10:57 PM, Kurt Seifried wrote: > Ok so I started looking at ownCloud to make sure I didn't issue a > duplicate. > > We have the following 4 CVE entries for ownCloud and no way to > match them to a fixed version. > > CVE-2012-2398 Cross-site scripting (XSS) vulnerability in > files/ajax/download.php in ownCloud 3.0.2 allows remote attackers > to inject arbitrary web script or HTML via the files parameter, a > different vulnerability than CVE-2012-2269.4. NOTE: the provenance > of this information is unknown; the details are obtained solely > from third party information. > > Is CVE-2012-2398 fixed in 3.0.3? > > CVE-2012-2397 Cross-site request forgery (CSRF) vulnerability in > ownCloud 3.0.2 allows remote attackers to hijack the authentication > of arbitrary users for requests that insert cross-site scripting > (XSS) sequences via vectors involving contacts. NOTE: the > provenance of this information is unknown; the details are obtained > solely from third party information. > > Is CVE-2012-2397 fixed in 3.0.3? > > CVE-2012-2270 Open redirect vulnerability in index.php (aka the > Login Page) in ownCloud 3.0.0 allows remote attackers to redirect > users to arbitrary web sites and conduct phishing attacks via a URL > in the redirect_url parameter. > > Is CVE-2012-2270 fixed in 3.0.1? > > CVE-2012-2269 Multiple cross-site scripting (XSS) vulnerabilities > in ownCloud 3.0.0 allow remote attackers to inject arbitrary web > script or HTML via (1) an arbitrary field to > apps/contacts/ajax/addcard.php, (2) the parameter parameter to > apps/contacts/ajax/addproperty.php, (3) the name parameter to > apps/contacts/ajax/createaddressbook, (4) the file parameter to > files/download.php, or the (5) name, (6) user, or (7) redirect_url > parameter to files/index.php. > > Is CVE-2012-2269 fixed in 3.0.1 > > Can you please confirm that these issues have been fixed, and in > what version of ownCloud? It would be very helpful if you could put > the CVE #'s into the ChangeLog at http://owncloud.org/changelog/ > > Once these 4 have been confirmed I can assign a CVE for the new > issue and the outstanding ones: > > Version 4.0.6 Aug 1th 2012 • Security: Check for Admin user in > appconfig.php • Security: Several CSRF security fixes > > Version 4.0.5 July 20th 2012 • Several CSRF security fixes > > Version 4.0.4 June 28th 2012 • Nothing security listed > > Version 4.0.3 June 23rd 2012 • Fix several XSS bugs • Implement > several CSRF security checks > > Version 4.0.2 June 11th 2012 • Several XSS fixes in calendar • > Several XSS fixes in contacts > > Version 4.0.1 June 4th 2012 • security: fix a XSS problem in > calendar • security: fix a XSS problem in contacts > > Version 4.0.0 May 22nd 2012 • Nothing security listed > > Version 3.0.3 April 27th 2012 • Security: Several CSRF fixes • > Security: .htaccess uploading blacklist > > Version 3.0.2 April 11th 2012 • Security: Make password hashes more > random • Security: Fix a XXS problem > > Version 3.0.1 April 3rd 2012 • Nothing security listed > > Version 3.0 January 31st 2012, Release Announcement • Nothing > security listed > > > > > - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iQIcBAEBAgAGBQJQO7NmAAoJEBYNRVNeJnmT8sIP/iR/cM8IyG8klE0+aYgAeceq L0jI5DStl1MV39HpOnhuF78PyX9A2uYWcNa8pvhkHoxa8iaEBPIkIAEOHt3nom5T tQ8BFc+mNS973CRcGSEerMW2ScbACxGoZnbeUpmE+PPkKnzqOfB+LwqSQTDUEknR d628o8sGc8Y3hSZynMqRFblc9sK39lWSAjavV3f/Wl/t12GXwOXlooPGgqhy33TV /iQ8qBb7sVxgxGAD/lt9QRbab8SIquqPlb1VQx2LlQ1JDMelfUeeLWR9JB9Rljxv 1ll/Fa10LgoEDw/Aa69UgShlClBTc3NAy6b1sEvO1OySe31WQmsCqLw20a9GbLen 4EEWGi1H9IX4t1kf7cKhVZMglNnFNR73tZbGaWw4I9fwGFG+GqRxRF+ElVuG3DaN DZh7RJ5pqE7w0hXRpj9WY18dXuDrIdRjhoJYrbf42R3xKN7m9chEiApw94B71p6/ NPGTJKuQ7eUwW87SGD7O+lBNjrXE43sg4CafYmlAVA9/d5W6lSen4ZOC1Ayzklfo SjBGENOAJ8Mye6JKyWyr2w8ZZP0olyayybG60RGsPkf05ktFv1aY4oYHO/fDMWgj I8+AqZ43TLpiz1/3DdX6XHfgxhRUPFtBcsK3ESkxIMvNNDto63HUWTx4z4/QnBPE gqrTSnTVUbHeCJNj2bNI =2iE9 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.