Description: unsticky has discovered a vulnerability in b2evolution, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to the "redirect_to" parameter in htsrv/login.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Successful exploitation allows adding additional attributes (e.g. "onMouseOver") to the "Bypass login..." link. The vulnerability is confirmed in version 1.8.6. Other versions may also be affected. Solution: Edit the source code to ensure that input is properly sanitised. Provided and/or discovered by: unsticky
dsd, please bump 1.8.7 has been available for a while
just noticed that our stable branch is 0.9x and I don't know if that even was affected, so we might not have to call arches but just bump the ebuild any ideas about it being affected or not?
Pulling in herd for advice.
*** Bug 174644 has been marked as a duplicate of this bug. ***
Yea 1.87 has been out for quite a while and 1.9.3 is out maybe we should file a separate version bump bug?
any news here?
Maintained by dsd but I fixed it while he is away. Hope that is okay. I added 1.10.2 to the tree and removed unstable 0.9.2 and 1.8.6. I'd suggest stabilizing 1.10.2 on alpha amd64 ppc as well as x86 and removing 0.9.1 after that.
Thanks a lot Gunnar, with your help we'll eventually manage to get the number of open security bugs down to an acceptable level :) Arches, please test and mark stable www-apps/b2evolution-1.10.2. Target keywords are: "alpha amd64 ppc x86"
alpha/x86 stable
amd64 stable
ppc stable, ready for glsa voting
voting NO.
I vote NO too.
ok, closing without glsa then. feel free to reopen if you disagree, as always :)