From ${URL} : A persistent / stored cross-site scripting (XSS) flaw was found in the way reviews dropdown of Review Board, a web-based code review tool, performed sanitization of certain user information (full name). A remote attacker could provide a specially-crafted URL that, when visited would lead to arbitrary HTML or web script execution in the context of Review Board user's session. References: [1] http://www.reviewboard.org/docs/releasenotes/reviewboard/1.7.10/ [2] http://www.reviewboard.org/docs/releasenotes/reviewboard/1.6.17/ [3] http://www.reviewboard.org/news/2013/06/22/review-board-1617-and-1710-released/ @maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
*reviewboard-1.7.7.1-r1 (28 Jun 2013) 28 Jun 2013; Ian Delaney <idella4@gentoo.org> +files/CVE-2013-2209-sec.patch, +reviewboard-1.7.7.1-r1.ebuild, reviewboard-1.7.7.1.ebuild: Sec patch applied, revbumped No outstanding bugs. But, eeeer 16 Jun 2013; Ian Delaney <idella4@gentoo.org> +files/docs.patch, +metadata.xml, +reviewboard-1.7.7.1.ebuild: new ebuild prepared by me with additions from kensington wrt Bug #209746 is it not a touch early to go for stable? Otherwise, fine by me.
I don't see any reason to mark this stable. I would suggest closing this.
Agreed, no need to go to stable, no GLSA required, and the offending versions have been removed. Closing.
CVE-2013-2209 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2209): Cross-site scripting (XSS) vulnerability in the auto-complete widget in htdocs/media/rb/js/reviews.js in Review Board 1.6.x before 1.6.17 and 1.7.x before 1.7.10 allows remote attackers to inject arbitrary web script or HTML via a full name.