Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <514E4A03.2060902@redhat.com>
Date: Sat, 23 Mar 2013 18:34:11 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>, come2waraxe@...oo.com
Subject: Re: CVE request: OpenCart filemanager.php parameter
 traversal arbitrary file access

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 03/23/2013 06:19 AM, Henri Salo wrote:
> Hello Kurt and list members,
> 
> Can we assign CVE identifier for security vulnerability in
> OpenCart, thanks.
> 
> References: http://www.waraxe.us/advisory-98.html 
> http://osvdb.org/91500 
> http://seclists.org/fulldisclosure/2013/Mar/176
> 
> Credits: Janek Vind "waraxe" Advisory ID: waraxe-2013-SA#098 
> Disclosure date: 2013-03-19 Status: not fixed in upstream CVSSv2
> Base Score = 5.0 Affected (from advisory) are all OpenCart
> versions, from 1.4.7 to 1.5.5.1, maybe older too.
> 
> Janek confirmed he has not requested CVE yet. I will contact
> OpenCart again later today and ask status for the fix.
> 
> -- Henri Salo

Please use CVE-2013-1891 for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)

iQIcBAEBAgAGBQJRTkoDAAoJEBYNRVNeJnmTyCUQAKKY+PpIw+/FAXkL44eVFv9p
j7XqFdUVjDvAKzZPlh859hCj8P2AXTJ0is8h2lomFqRIHeJIfHui9truwH/01akF
u3m1ifWlseNOBJ4xRCt1pxM2nonl4He9BZeg3m6tVUyLqgKILsr8Yxrynh+VAyog
ZhAYLtpnvDM6+DVo66A5heeKCvNuViUUWJ+Fn5M6yPqLBt2vY3ATuE2BpurmElEM
AapKo6FYV6lsnQBQUMbSLqOZkC/PiRRxrRtF0PLbtW6zNJIMD0xVfMkEO6Tczfbj
2Y4dBoEl7V+9lugjTboAo3wxv0DjqYKOqE/gFNmof2kGxV1UCIJXjEviuGXCJl0v
210bhIHtFs66MPZH6Dlkj5TsdDdp89NNKbl2zU1PytSeoQfBrXsP3sdh+cmcuffY
8vm5Dw2VTTc7uolXsIoYiTM28PphN2xlma6BzFje49/PyLAiFSY0RSffQunywzki
6ju97ndQuc+E6FAyE2FvF3kAInSkuyI7ljLXanllDsvz3kB60SvB3Pj155qUBt3D
wJ0obQkACXCpHbAb3a/tEIEWqas99AoaIrDhzXZZ7pfEkQQ0W3k6Wc+iJbWHn2NU
kceBMaXwdJCAuwq8I76ZBCFv71EsSqUPJIOwuTxnEH7HTM0fx1yAx8Ew9pepT/YN
8ZFZj6W5qXr0jsevo65+
=IZNn
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.