oss-sec mailing list archives

Re: CVE request: XSS flaws fixed in ganglia


From: Raphael Geissert <atomo64 () gmail com>
Date: Thu, 21 Feb 2013 11:47:10 +0100

Hi,

On 8 February 2013 19:06, Vincent Danen <vdanen () redhat com> wrote:
A number of XSS issues were fixed in ganglia's web ui:

https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e

I've a hunch that there are a few issues with the changes. A quick
look at the patch shows that the change here breaks the preg_replace
call:

- $query_string = preg_replace("/(&trendhistory=)(\d+)/", "", $query_string);
+ $query_string = preg_replace("/(&trendhistory=)(\d+)/", "",
htmlspecialchars($query_string, ENT_QUOTES) );

It looks as if the htmlspecialchars call was misplaced.  Not that it
is a security issue, but it's a bug.

Can anyone forward this upstream? I will try to take a look at the
rest of the patch later.

Cheers,
-- 
Raphael Geissert


Current thread: