Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 443146 (CVE-2012-6130) - <www-apps/roundup-1.4.20: Multiple XSS (CVE-2012-{6130,6131,6132,6133})
Summary: <www-apps/roundup-1.4.20: Multiple XSS (CVE-2012-{6130,6131,6132,6133})
Status: RESOLVED FIXED
Alias: CVE-2012-6130
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-11-14 20:17 UTC by Agostino Sarubbo
Modified: 2014-08-25 23:00 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2012-11-14 20:17:29 UTC
From http://www.openwall.com/lists/oss-security/2012/11/10/2 :

Roundup upstream has released new upstream 1.4.20 version,
correcting multiple cross-site scripting (XSS) flaws (and
couple of other security related issues):
[1] http://pypi.python.org/pypi/roundup
[2] https://bugzilla.redhat.com/show_bug.cgi?id=722672

More from [1] (plus relevant tickets inlined too, where
possible to find out):
---------------------------------------------------------
[A] * issue2550729: Fix password history display for anydbm backend,
thanks to Ralf Hemmecke for reporting. (Ralf)
[3] http://issues.roundup-tracker.org/issue2550729

[B] * issue2550684 Fix XSS vulnerability when username contains HTML code,
thanks to Thomas Arendsen Hein for reporting and patch. (Ralf)
[4] http://issues.roundup-tracker.org/issue2550684

[C] * issue2550711 Fix XSS vulnerability in @action parameter,
thanks to "om" for reporting. (Ralf)
[5] http://issues.roundup-tracker.org/issue2550711

[D] * Fix wrong execute permissions on some files,
thanks to Cheer Xiao for the patch. (Ralf)

[E] * Fix another XSS with the "otk" parameter,
thanks to Jesse Ruderman for reporting. (Ralf)

[F] * Mark cookies HttpOnly and -- if https is used -- secure. Fixes issue2550689,
but is untested if this really works in browsers. Thanks to Joseph Myers for reporting. (Ralf)
[6] http://issues.roundup-tracker.org/issue2550689

[G] * Fix another XSS with the ok- and error message, see issue2550724. We solve this differently
from the proposals in the bug-report by not allowing any html-tags in ok/error messages
anymore. Thanks to David Benjamin for the bug-report and to Ezio Melotti for several proposed 
fixes. (Ralf)
[7] http://issues.roundup-tracker.org/issue2550724
Comment 1 Sean Amoss (RETIRED) gentoo-dev Security 2012-11-15 15:01:48 UTC
web-apps, is =www-apps/roundup-1.4.20 ready for stabilization?
Comment 2 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-11 03:39:43 UTC
Arches, please test and stabilize =www-apps/roundup-1.4.20, target arches: amd64 ppc sparc x86. Thanks!
Comment 3 Agostino Sarubbo gentoo-dev 2013-09-11 14:00:28 UTC
amd64 stable
Comment 4 Agostino Sarubbo gentoo-dev 2013-09-12 17:38:10 UTC
ppc stable
Comment 5 Agostino Sarubbo gentoo-dev 2013-09-14 10:13:47 UTC
x86 stable
Comment 6 Agostino Sarubbo gentoo-dev 2013-09-14 10:40:17 UTC
sparc stable
Comment 7 Sean Amoss (RETIRED) gentoo-dev Security 2013-09-14 15:18:29 UTC
GLSA vote: no.

Maintainers, please drop vulnerable versions.
Comment 8 Sergey Popov gentoo-dev 2013-09-15 11:59:29 UTC
GLSA vote: no

Waiting for cleanup
Comment 9 Yury German Gentoo Infrastructure gentoo-dev 2013-12-30 07:40:58 UTC
Ping!

Maintainer(s), please drop the vulnerable version.
Comment 10 Yury German Gentoo Infrastructure gentoo-dev 2014-06-18 01:58:10 UTC
Maintainers, this has not been cleaned up in 5 months.

Please clean up or security will have to force clean in 30 days.
Comment 11 GLSAMaker/CVETool Bot gentoo-dev 2014-08-19 22:16:21 UTC
CVE-2012-6132 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6132):
  Cross-site scripting (XSS) vulnerability in Roundup before 1.4.20 allows
  remote attackers to inject arbitrary web script or HTML via the otk
  parameter.

CVE-2012-6131 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6131):
  Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before
  1.4.20 allows remote attackers to inject arbitrary web script or HTML via
  the @action parameter to support/issue1.

CVE-2012-6130 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6130):
  Cross-site scripting (XSS) vulnerability in the history display in Roundup
  before 1.4.20 allows remote attackers to inject arbitrary web script or HTML
  via a username, related to generating a link.
Comment 12 Chris Reffett (RETIRED) gentoo-dev Security 2014-08-25 23:00:18 UTC
Cleanup appears to have been done, closing noglsa.