Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu,  4 Jun 2015 16:52:06 -0400 (EDT)
From: cve-assign@...re.org
To: mattd@...fuzz.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE requests / Advisory: Codestyling Localization (Wordpress plugin) - multiple RCE via CSRF, multiple XSS

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> The plugin contains multiple AJAX actions that, while having the
> necessary permission checks, do not have anti-CSRF protection

It appears that the main vulnerability you are reporting is the
multiple CSRF. Use CVE-2015-4179.

In reading your advisory, we weren't able to determine if there are
any realistic scenarios in which an authenticated user would
intentionally use csp_po_scan_source_file or csp_po_save_catalog_entry
for RCE (i.e., scenarios that do not involve CSRF) and thereby obtain
additional access to the server machine. We think you may mean
scenarios in which the authenticated user has the manage_options
capability but not the edit_plugins capability.

(As always, to obtain multiple CVE IDs for a report, it is useful to
describe all of the substantially distinct scenarios, not only the
scenarios in which risk is greatest.)

Also, we did not understand whether the "Multiple XSS in various AJAX
actions ... reflected unescaped POST parameters in certain AJAX
actions' responses" issue is independently relevant. Do you mean that
there is unescaped reflection regardless of whether the AJAX action is
authorized? More specifically, if all of the CSRF issues in the plugin
were fixed in a normal way, would unauthenticated attackers be able to
conduct XSS attacks by hosting JavaScript code that forces an
administrator's browser to make a POST request without a nonce?

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVcLnjAAoJEKllVAevmvmsH/EH+gJtzMpmfDSZvNRUMm+FvmwE
iKxnRF2dgbNddMflDOSs7PopaJNVqkrSCvRdU+0Aa1WTpzw53rGUMQaWE4B0G4yl
zhT7AdqrKwdyHPgPZRlB6eWHP0BYrMUxxnGCFUqNrbAxLoo56li7qvh/chngdK/P
bHwsqzH99SuwcAxkkIt5tKR6b0nuE9H4Y8VTCo6Ixtdwv+R9Rv+pc8vfBpfYR2WD
zJnzln93P00jjGeuzl2U4pfuAI0gWztvPPc9HxwuQ+mMLUjrsQiLE709wyz6+hL8
T5ihleND805qmlIMKPRWcEyDJKY4aWPdiasVTupWGDtUKhNzhVlBh0WPvo6GofM=
=yWSh
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.