oss-sec mailing list archives
Re: CVE request: XSS flaws fixed in ganglia
From: Raphael Geissert <atomo64 () gmail com>
Date: Thu, 21 Feb 2013 11:47:10 +0100
Hi, On 8 February 2013 19:06, Vincent Danen <vdanen () redhat com> wrote:
A number of XSS issues were fixed in ganglia's web ui: https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e
I've a hunch that there are a few issues with the changes. A quick
look at the patch shows that the change here breaks the preg_replace
call:
- $query_string = preg_replace("/(&trendhistory=)(\d+)/", "", $query_string);
+ $query_string = preg_replace("/(&trendhistory=)(\d+)/", "",
htmlspecialchars($query_string, ENT_QUOTES) );
It looks as if the htmlspecialchars call was misplaced. Not that it
is a security issue, but it's a bug.
Can anyone forward this upstream? I will try to take a look at the
rest of the patch later.
Cheers,
--
Raphael Geissert
Current thread:
- CVE request: XSS flaws fixed in ganglia Vincent Danen (Feb 08)
- Re: CVE request: XSS flaws fixed in ganglia Kurt Seifried (Feb 08)
- Re: CVE request: XSS flaws fixed in ganglia Raphael Geissert (Feb 21)
- Re: CVE request: XSS flaws fixed in ganglia Salvatore Bonaccorso (Feb 21)
- Re: CVE request: XSS flaws fixed in ganglia Raphael Geissert (Feb 21)
- Re: CVE request: XSS flaws fixed in ganglia Kurt Seifried (Feb 26)
- Re: CVE request: XSS flaws fixed in ganglia Raphael Geissert (Mar 20)
