Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2046753133.1643151277925743488.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Wed, 30 Jun 2010 15:22:23 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE request: XSS in python paste

Please use CVE-2010-2477

Thanks.

-- 
    JB


----- "Raphael Geissert" <geissert@...ian.org> wrote:

> Hi,
> 
> Quoting [1]:
> 
> > Paste 1.7.4 is released.  The only real change is to
> paste.httpexceptions, 
> > which was using insecure quoting of some parameters and allowed an
> XSS 
> > hole, 
> > most specifically with its 404 messages.  The most notably WSGI 
> > application 
> > using this is paste.urlparse.StaticURLParser and PkgResourcesParser.
>  By 
> > directing someone to an appropriately formed URL an attacker can
> execute 
> > arbitrary Javascript on the victim's client.  paste.urlmap.URLMap is
> also 
> > affected, but only if you have no application attached to /.  Other
> 
> > applications using paste.httpexceptions may be effected (especially
> 
> > HTTPNotFound).  WebOb/webob.exc.HTTPNotFound is not affected. 
> 
> The commit fixing this bug appears to be:
> http://bitbucket.org/ianb/paste/changeset/fcae59df8b56
> Homepage:
> http://pythonpaste.org/
> 
> Could a CVE be assigned?
> 
> Thanks in advance.
> 
> [1] http://groups.google.com/group/paste-
> users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1
> 
> Regards,
> -- 
> Raphael Geissert - Debian Developer
> www.debian.org - get.debian.net

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.