Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 10 Oct 2017 19:53:18 +0200
From: chbi@...i.eu
To: oss-security@...ts.openwall.com
Subject: Re: Stored XSS vulnerabilities in Flyspray


> A stored XSS vulnerability in Flyspray before 1.0-rc6 allows an
> authenticated user to inject JavaScript to gain administrator privileges.
> 
> Fix:
> https://github.com/Flyspray/flyspray/commit/754ec5d04348ef7ecb8cb02ade976dc412b031f8

CVE-2017-15213 has been assigned.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15213


> A stored XSS vulnerability in Flyspray between 1.0-rc4 and 1.0-rc6
> allows an authenticated user to inject JavaScript to gain administrator
> privileges and also to execute JavaScript against other users (including
> unauthenticated users).
> 
> Fix
> https://github.com/Flyspray/flyspray/commit/00cfae5661124f9d67ac6733db61b2bfee34dccc

CVE-2017-15214 has been assigned.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15214


-- 
chbi
https://chbi.eu

GPG: 3DE9 9187 4BE9 EAE6 3CA8  DC20 BA7B 93F9 9037 AE7E
     https://chbi.eu/chbi.asc



Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.