Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 03 Nov 2013 09:36:33 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request for Drupal contributed modules

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/02/2013 11:37 PM, Forest Monsen wrote:
> Hi there! I'd like to request CVE identifiers for:
> 
> SA-CONTRIB-2013-081 - Spaces - Access bypass 
> https://drupal.org/node/2118717

Please use CVE-2013-4498 for this issue.

> SA-CONTRIB-2013-082 - Bean - Cross Site Scripting (XSS) 
> https://drupal.org/node/2118873

Please use CVE-2013-4499 for this issue.

> SA-CONTRIB-2013-083 - Quiz - Access Bypass 
> https://drupal.org/node/2123995 (This appears to me to be two
> issues; an access bypass, and an access bypass leading to
> information disclosure.)

Yes, two issues, two reporters, so CVE SPLIT to two CVE's, I can't
match the reporter to the issue though without more info, if you can
post that in a follow up it'd be helpful to Mitre.

Please use  CVE-2013-4500 for Drupal SA-CONTRIB-2013-083 - Quiz -
Access Bypass in deleting quiz results

Please use CVE-2013-4501 for Drupal SA-CONTRIB-2013-083 - Quiz -
Access Bypass in viewing quiz results


> SA-CONTRIB-2013-084 - FileField Sources - Access Bypass 
> https://drupal.org/node/2124241

Please use CVE-2013-4502 for this issue.

> SA-CONTRIB-2013-085 - Feed Element Mapper - Cross Site Scripting 
> https://drupal.org/node/2124279

Please use CVE-2013-4503 for this issue.

> SA-CONTRIB-2013-086 - Monster Menus - Access bypass 
> https://drupal.org/node/2124289

Please use CVE-2013-4504 for this issue.

> Thanks! Forest
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)

iQIcBAEBAgAGBQJSdnuRAAoJEBYNRVNeJnmTkxIP/3PfWX7Ocvfa3HiPDAK/LKOR
XI42NsYmEs77HrdugoJvMQ78Fh/UQD8yxVmlVNBCYqN2xpdfpmcNYiLhtouIRiO4
1VTUixhehBJtSKPSHfpJJEcnK34Bnw4o+lMgDO0LiEMWNfiyD+aIShewWtNFhnvl
/r9hqOO6YKe498uqT312sn3tGh2G1Y28YRnALfa5dU9VjrNEk5bECN1+qE7BhrLw
23H9JkPR8shpP8t8MGHoTfEptnv+/ooWvovnmjqNhoJVpufQEJj9oqbkyhrtK0c2
BD7PSt3XuS17kQTVsQ1/L9XGB0bD6HS+VABp779yOTg+AX5caRGh1vMYbdzjyrPC
Ao6J7auwzQiLd/+48gnU3c3gVuaplXxcSuhoK9FiqlFXyts7H8Dp/1LiNiZsMz9d
TPHxQE3WV18ZLSElJ6FPlz+EL2s5V9bZZ4EKLMsnWuA67tKH5HiSDE0DiVYF0E7e
wgQPv5W2XgkkUTneaECIF83MSrKnVgp65/q/OMG4agdUPsFhcsREIKa1NgVSjAmq
EqSJ/cHsP8Aqb8xZyUB2yBMHpwjziwrI7NHmrbv1jwXsw0PrRZlfmR1MPn3rpmO8
N4n0XQZRREd72Nc8sSAaatRv56b9elvTC2A8mDTyww4yI28Rh6M8NPnMj+jKqQWT
hMRoULxGSouOrdHoeNkD
=Keg+
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.