Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 15 Jan 2015 16:44:39 -0500
From: Daniel Kahn Gillmor <>
To: Henri Salo <>,
Subject: Re: CVE-Request -- CMS b2evolution v.5.2.0 -- Reflecting XSS vulnerability in filemanager functionality

Hi Henri--

Your recent message:

On Thu 2015-01-15 01:56:41 -0500, Henri Salo wrote:
> Hash: SHA1
> Fixed in 5.2.1 version.
> - -- 
> Henri Salo
> Version: GnuPG v1.4.12 (GNU/Linux)
> iEYEARECAAYFAlS3ZKkACgkQXf6hBi6kbk/EXACgobA8v+eNpA8mbR85uzP1rSH/
> YfEAoMqRuWAaDysP7GYpQJ+zLAkKze+A
> =XgEo

Is a bit troubling, because it seems to rely on the Subject: line for
necessary context in interpreting the signed message.

An attacker could take this signed message, and replay it "From" you
with a changed subject line to try to indicate that you think some other
bug was fixed in some other piece of software, version 5.2.1.

You can avoid this kind of problem by ensuring that the messages you
sign are context-independent (e.g. including the information currently
in this message's subject line in your message body directly as well).



Download attachment "signature.asc" of type "application/pgp-signature" (949 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.