Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 162171 - www-apps/b2evolution < 1.10.2 "redirect_to" HTML Attribute XSS (CVE-2007-0175)
Summary: www-apps/b2evolution < 1.10.2 "redirect_to" HTML Attribute XSS (CVE-2007-0175)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/23656/
Whiteboard: B?4 [noglsa]
Keywords:
: 174644 (view as bug list)
Depends on:
Blocks:
 
Reported: 2007-01-15 08:29 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2007-08-14 20:03 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-01-15 08:29:17 UTC
Description:
unsticky has discovered a vulnerability in b2evolution, which can be exploited by malicious people to conduct cross-site scripting attacks.
 
 Input passed to the "redirect_to" parameter in htsrv/login.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
 
 Successful exploitation allows adding additional attributes (e.g. "onMouseOver") to the "Bypass login..." link.
 
 The vulnerability is confirmed in version 1.8.6. Other versions may also be affected.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
unsticky
Comment 1 Matthias Geerdsen (RETIRED) gentoo-dev 2007-03-16 15:31:21 UTC
dsd, please bump

1.8.7 has been available for a while
Comment 2 Matthias Geerdsen (RETIRED) gentoo-dev 2007-03-16 15:33:46 UTC
just noticed that our stable branch is 0.9x and I don't know if that even was affected, so we might not have to call arches but just bump the ebuild
any ideas about it being affected or not?
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-03-25 10:30:14 UTC
Pulling in herd for advice.
Comment 4 Jakub Moc (RETIRED) gentoo-dev 2007-04-15 07:18:17 UTC
*** Bug 174644 has been marked as a duplicate of this bug. ***
Comment 5 coran.fisher@gmail.com 2007-04-26 18:59:51 UTC
Yea 1.87 has been out for quite a while and 1.9.3 is out maybe we should file a separate version bump bug?
Comment 6 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-05-31 09:39:05 UTC
any news here?
Comment 7 Gunnar Wrobel (RETIRED) gentoo-dev 2007-08-09 11:29:09 UTC
Maintained by dsd but I fixed it while he is away. Hope that is okay. I added 1.10.2 to the tree and removed unstable 0.9.2 and 1.8.6.

I'd suggest stabilizing 1.10.2 on alpha amd64 ppc as well as x86 and removing 0.9.1 after that.
Comment 8 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-08-09 11:37:35 UTC
Thanks a lot Gunnar, with your help we'll eventually manage to get the number of open security bugs down to an acceptable level :)
Arches, please test and mark stable www-apps/b2evolution-1.10.2.
Target keywords are: "alpha amd64 ppc x86"
 
Comment 9 Raúl Porcel (RETIRED) gentoo-dev 2007-08-10 11:25:09 UTC
alpha/x86 stable
Comment 10 Steve Dibb (RETIRED) gentoo-dev 2007-08-11 14:57:55 UTC
amd64 stable
Comment 11 Tobias Scherbaum (RETIRED) gentoo-dev 2007-08-14 18:17:56 UTC
ppc stable, ready for glsa voting
Comment 12 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-08-14 18:51:08 UTC
voting NO.
Comment 13 Matt Fleming (RETIRED) gentoo-dev 2007-08-14 19:58:37 UTC
I vote NO too.
Comment 14 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-08-14 20:03:08 UTC
ok, closing without glsa then. feel free to reopen if you disagree, as always :)