Home page logo

oss-sec logo oss-sec mailing list archives

Re: CVE Status Clarification / Request -- kadu: Stored XSS by parsing contact's status and sms messages in history
From: Rafał Malinowski <rafal.przemyslaw.malinowski () gmail com>
Date: Mon, 27 Feb 2012 11:28:35 +0100


I'm forwarding this mail to bug reported, Mateusz Goik
(aliantsoft.pl). He said that he will take care of CVE identifier
after Kadu 0.11.1 is released (it is available since late Saturday).


W dniu 27 lutego 2012 11:05 użytkownik Jan Lieskovsky
<jlieskov () redhat com> napisał:
Hello Mariusz, Kurt, Steve, vendors,

 [1] though https://bugzilla.novell.com/show_bug.cgi?id=749036#c0
 mentions CVE identifier has been already requested for this:

 "The bug still doesn't have CVE number but will have in near future."

 it doesn't look like CVE id has been requested for this via OSS
 security list, so moving this discussion / CVE request there.

 Mariusz, could you clarify, if this issue has got a CVE identifier
 already or if we still need one? If aren't able to do so, whom
 should we contact to be clear about "CVE request status" for this?

 Or at least clarify which list that "Here is a part of massage sent
 by developers to package maintainers:" has been sent to? (so
 we could ask there)

 And in the end either use that one, already allocated or allocate
 a new one here via OSS.

 Below being issue description as I got it based on / from [2]:

 A stored cross-site scripting (XSS) flaw was found in the way Kadu, the
messenger compatible with the Gadu-Gadu protocol, performed sanitization of
status and sms messages for particular contact in user's history. A remote
attacker could provide a specially-crafted status or sms message, which
be stored in victim's Kadu history file, if the attacker was present on the
contact list of the victim and the victim has had storage of statuses
for their history file. When the victim later examined the content of the
status history, this flaw could lead to arbitrary HTML or webscript

[2] https://bugzilla.novell.com/show_bug.cgi?id=749036
[3] https://bugzilla.redhat.com/show_bug.cgi?id=797777

Upstream patches:
   (patch for the XSS issue)

   (additional hardening)

   (disable xhtmlrequests)

  (allow only GET and HEADER requests, additional hardening)

Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]