Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 474634 (CVE-2013-2209) - <dev-util/reviewboard-1.7.7.1-r1: Stored XSS due improper sanitization of user's full name in the reviews dropdown (CVE-2013-2209)
Summary: <dev-util/reviewboard-1.7.7.1-r1: Stored XSS due improper sanitization of use...
Status: RESOLVED FIXED
Alias: CVE-2013-2209
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-06-24 20:22 UTC by Agostino Sarubbo
Modified: 2013-08-31 18:43 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-06-24 20:22:57 UTC
From ${URL} :

A persistent / stored cross-site scripting (XSS) flaw was found in the way reviews dropdown of Review Board, a web-based code review tool, performed sanitization of certain 
user information (full name). A remote attacker could provide a specially-crafted URL that, when visited would lead to arbitrary HTML or web script execution in the context 
of Review Board user's session.

References:
[1] http://www.reviewboard.org/docs/releasenotes/reviewboard/1.7.10/
[2] http://www.reviewboard.org/docs/releasenotes/reviewboard/1.6.17/
[3] http://www.reviewboard.org/news/2013/06/22/review-board-1617-and-1710-released/


@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Ian Delaney (RETIRED) gentoo-dev 2013-06-28 02:58:45 UTC
*reviewboard-1.7.7.1-r1 (28 Jun 2013)

  28 Jun 2013; Ian Delaney <idella4@gentoo.org> +files/CVE-2013-2209-sec.patch,
  +reviewboard-1.7.7.1-r1.ebuild, reviewboard-1.7.7.1.ebuild:
  Sec patch applied, revbumped

No outstanding bugs. But, eeeer

  16 Jun 2013; Ian Delaney <idella4@gentoo.org> +files/docs.patch,
  +metadata.xml, +reviewboard-1.7.7.1.ebuild:
  new ebuild prepared by me with additions from kensington wrt Bug #209746

is it not a touch early to go for stable? Otherwise, fine by me.
Comment 2 Mike Gilbert gentoo-dev 2013-06-30 06:19:40 UTC
I don't see any reason to mark this stable. I would suggest closing this.
Comment 3 Chris Reffett (RETIRED) gentoo-dev Security 2013-06-30 12:14:38 UTC
Agreed, no need to go to stable, no GLSA required, and the offending versions have been removed. Closing.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2013-08-31 18:43:34 UTC
CVE-2013-2209 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2209):
  Cross-site scripting (XSS) vulnerability in the auto-complete widget in
  htdocs/media/rb/js/reviews.js in Review Board 1.6.x before 1.6.17 and 1.7.x
  before 1.7.10 allows remote attackers to inject arbitrary web script or HTML
  via a full name.