Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 156574 - www-apps/b2evolution XSS issue
Summary: www-apps/b2evolution XSS issue
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.securityfocus.com/archive/...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-11-28 21:58 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2007-03-07 13:52 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-11-28 21:58:50 UTC
Security Advisory
 _________________________________________
 _________________________________________
 
 Severity: Medium
 Title: b2evolution XSS Vulnerability
 Date: 28.11.06
 Author: tarkus (tarkus (at) tiifp (dot) org)
 Web: https://tiifp.org/tarkus
 Vendor: b2evolution (http://b2evolution.net/)
 Affected Product(s): b2evolution 1.8.2 - 1.9 beta
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
 Description:
 ------------
 
 http://<victim>/<b2epath>/inc/VIEW/errors/_404_not_found.page.php?bas eurl=[XSS]&app_name=[XSS]
 
 http://<victim>/<b2epath>/inc/VIEW/errors/_410_stats_gone.page.php?ap p_name=[XSS]
 
 http://<victim>/<b2epath>/inc/VIEW/errors/_referer_spam.page.php?ReqU RI=[XSS]&app_name=[XSS]
 
 Workaround:
 -----------
 
 Put the following line at the beginning of the files.
 
 if( !defined('EVO_MAIN_INIT') ) die( 'Please, do not access this page directly.' );
 
 Timeline:
 ---------
 
 Reported to Vendor: 10.11.06
 Vendor response: 10.11.06
 Patch in CVS: 10.11.06
Comment 1 Matthias Geerdsen (RETIRED) gentoo-dev 2006-11-29 13:34:11 UTC
https://tiifp.org/tarkus/advisories/b2evolution111106_02.txt
https://tiifp.org/tarkus/advisories/b2evolution111106_01.txt

both advisories talk about higher versions than we have in the tree

dsd, could you verify that we are not affected by this?
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-11-29 21:08:05 UTC
At least the Remote File inclusion Vulnerability mentioned in comment #1 requires register_globals and allow_url_fopen have to be On.
Comment 3 Matthias Geerdsen (RETIRED) gentoo-dev 2007-01-17 19:24:16 UTC
any news here?
Comment 4 Daniel Drake (RETIRED) gentoo-dev 2007-01-28 01:30:21 UTC
I don't understand what the issues are, but I guess we can say it's fixed in the latest version in portage.
Comment 5 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2007-02-10 19:34:55 UTC
"requires register_globals and allow_url_fopen have to be On."

Closing. Feel free to reopen if you disagree
Comment 6 Matthias Geerdsen (RETIRED) gentoo-dev 2007-03-07 13:52:50 UTC
(In reply to comment #5)
> "requires register_globals and allow_url_fopen have to be On."
> 
> Closing. Feel free to reopen if you disagree
> 

;-)