oss-sec mailing list archives

Re: CVE Request -- roundup: Multiple XSS flaws plus other security related fixes corrected in upstream 1.4.20 version


From: Kurt Seifried <kseifried () redhat com>
Date: Wed, 13 Feb 2013 03:02:05 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/10/2012 04:42 AM, Jan Lieskovsky wrote:
Hello Kurt, Steve, vendors,

Ok some questions/comments inline

Roundup upstream has released new upstream 1.4.20 version, 
correcting multiple cross-site scripting (XSS) flaws (and couple of
other security related issues): [1]
http://pypi.python.org/pypi/roundup [2]
https://bugzilla.redhat.com/show_bug.cgi?id=722672

More from [1] (plus relevant tickets inlined too, where possible to
find out): 
--------------------------------------------------------- [A] *
issue2550729: Fix password history display for anydbm backend, 
thanks to Ralf Hemmecke for reporting. (Ralf) [3]
http://issues.roundup-tracker.org/issue2550729

rsc () runtux com

[A] Doesn't have security implications if roundup is correnctly
configured. The bug would create a python backtrace. Unless the "debug"
option in section [web] is set (which is explicitly discouraged) this
will only display "an error has occurred" in the web-interface. Even if
someone sets the debug option in a production release only the hashed
password could be disclosed. Note that this bug only affects the anydbm
backend which should not be used for a production version either.


[B] * issue2550684 Fix XSS vulnerability when username contains
HTML code, thanks to Thomas Arendsen Hein for reporting and patch.
(Ralf) [4] http://issues.roundup-tracker.org/issue2550684

Please use CVE-2012-6130 for this issue

[C] * issue2550711 Fix XSS vulnerability in @action parameter, 
thanks to "om" for reporting. (Ralf) [5]
http://issues.roundup-tracker.org/issue2550711

Please use CVE-2012-6131 for this issue

[D] * Fix wrong execute permissions on some files, thanks to Cheer
Xiao for the patch. (Ralf)

rsc () runtux com

[D] No security implications: Fixed some permissions on files in
roundup/cgi and locale directories. These are not accessible via the
web-server. So this doesn't constitute a remote vulnerability. Local
users don't gain anything executing these files as no privilege
escalation is involved (they could copy the file which is readable
anyway and make their local copy executable).

[E] * Fix another XSS with the "otk" parameter, thanks to Jesse
Ruderman for reporting. (Ralf)

Please use CVE-2012-6132 for this issue

[F] * Mark cookies HttpOnly and -- if https is used -- secure.
Fixes issue2550689, but is untested if this really works in
browsers. Thanks to Joseph Myers for reporting. (Ralf) [6]
http://issues.roundup-tracker.org/issue2550689

This appears to be security hardening, not a vulnerability, is that
correct?

[G] * Fix another XSS with the ok- and error message, see
issue2550724. We solve this differently from the proposals in the
bug-report by not allowing any html-tags in ok/error messages 
anymore. Thanks to David Benjamin for the bug-report and to Ezio
Melotti for several proposed fixes. (Ralf) [7]
http://issues.roundup-tracker.org/issue2550724

Please use CVE-2012-6133 for this issue

Cc-ed Ralf Schlatterbeck on this post too to clarify, if issues [A]
and [D] would also have security implications / IOW if those would
be security flaws too. Ralf please clarify. Thank you, Jan.

Could you allocate CVE ids for these (once clarified)?

Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
Security Response Team



- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=dlUe
-----END PGP SIGNATURE-----


Current thread: