|
Message-ID: <4FA1E056.9090304@redhat.com> Date: Wed, 02 May 2012 19:33:10 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Greg Knaddison <greg.knaddison@...uia.com> Subject: Re: CVE Request for Drupal contributed modules -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/02/2012 06:53 PM, Greg Knaddison wrote: > Hello, > > First, thanks to Kurt for getting us CVEs in advance on Drupal > core's latest release at http://drupal.org/node/1557938 with CVEs > on each issue. > > This is a CVE request for the following contributed module issues: > > http://drupal.org/node/1558248 SA-CONTRIB-2012-072 - cctags - > Cross Site Scripting (XSS) http://drupal.org/node/1557874 > SA-CONTRIB-2012-071 - Glossify - Cross Site Scripting (XSS) - > Unsupported http://drupal.org/node/1557872 SA-CONTRIB-2012-070 - > Taxonomy Grid : Catalog - Cross Site Scripting (XSS) - Unsupported > http://drupal.org/node/1557868 SA-CONTRIB-2012-069 - Addressbook > - Multiple vulnerabilities - Unsupported > http://drupal.org/node/1557852 SA-CONTRIB-2012-068 - Node Gallery > - Cross Site Request Forgery (CSRF) - Unsupported > http://drupal.org/node/1547738 SA-CONTRIB-2012-067 - Linkit - > Access bypass http://drupal.org/node/1547736 SA-CONTRIB-2012-066 - > Spaces and Spaces OG - Access Bypass http://drupal.org/node/1547686 > SA-CONTRIB-2012-065 - Sitedoc - Information disclosure > http://drupal.org/node/1547674 SA-CONTRIB-2012-064 - Ubercart - > Multiple vulnerabilities http://drupal.org/node/1547660 > SA-CONTRIB-2012-063 - RealName - Cross Site Scripting (XSS) > http://drupal.org/node/1547520 SA-CONTRIB-2012-062 - Creative > Commons - Cross Site Scripting (XSS) > > Other issues from 2012 that don't have a CVE per your policies: > http://drupal.org/node/1515282 SA-CONTRIB-2012-056 - Janrain > Engage - Sensitive Data Protection Vulnerability > http://drupal.org/node/1506542 SA-CONTRIB-2012-050 - CDN2 Video - > Unsupported > > Thanks, Greg > Please use the following: CVE-2012-2154 Drupal SA-CONTRIB-2012-050 - CDN2 Video - XSS CVE-2012-2155 Drupal SA-CONTRIB-2012-050 - CDN2 Video - CSRF CVE-2012-2296 Drupal SA-CONTRIB-2012-056 - Janrain Engage - Sensitive Data Protection Vulnerability CVE-2012-2297 Drupal SA-CONTRIB-2012-062 - Creative Commons - XSS CVE-2012-2298 Drupal SA-CONTRIB-2012-063 - RealName - XSS CVE-2012-2299 Drupal SA-CONTRIB-2012-064 - Ubercart - failure to encrypt data CVE-2012-2300 Drupal SA-CONTRIB-2012-064 - Ubercart - XSS CVE-2012-2301 Drupal SA-CONTRIB-2012-064 - Ubercart - Arbitrary PHP Execution CVE-2012-2302 Drupal SA-CONTRIB-2012-065 - Sitedoc - Information disclosure CVE-2012-2303 Drupal SA-CONTRIB-2012-066 - Spaces and Spaces OG - Access Bypass CVE-2012-2304 Drupal SA-CONTRIB-2012-067 - Linkit - Access bypass CVE-2012-2305 Drupal SA-CONTRIB-2012-068 - Node Gallery - CSRF CVE-2012-2306 Drupal SA-CONTRIB-2012-069 - Addressbook - SQL Injection CVE-2012-2307 Drupal SA-CONTRIB-2012-069 - Addressbook - CSRF CVE-2012-2308 Drupal SA-CONTRIB-2012-070 - Taxonomy Grid : Catalog - XSS CVE-2012-2309 Drupal SA-CONTRIB-2012-071 - Glossify - XSS CVE-2012-2310 Drupal SA-CONTRIB-2012-072 - cctags - XSS - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJPoeBVAAoJEBYNRVNeJnmTOosQAKet4gG78Tgq9TeyfDBrLQga n+TTEhVEFRNA6dOrG9da0JMhrhIuS13pIDJ2wfupqIzL7Ti5yebEiQH+rJs13Ax+ sXJUfj1f24x1D9J8uS3KVzREdKF+wl3Lta+TEiolgQxy4dqm4UCRbc+ChBcGCFca +aA/tAwx4pbJrIoEj+7wTzq2tTaiv3vK/b8bbZENYgr0MXVIm9TFCHSgs8EsaLi9 xFw9FumByrXy0+Ok/EBsGvIpo0sFTAeUsBhD00n45Pf47Y1fiCurgyTwjiNFUACi TwW/d1OEXHKGokRFNfHiwsJQtii4Q5erSUZ0Kxe99tIKTry9Wvx31UBW1QmDRJrn /M6lEMXJVWSJCoVrhEIAxiQOgzZDM2HxeJ//g+H4Q5VN4xcfPGf6dSCnPEldmoir xRXIYWhTYhaLYAg9VPVYc06907khHAupkZvD2N/fbaojIP91IJ3Ez7LdezHqwuKP qDdY6DuraXs6VEZ2esNmVGysR7g24XgLbOoOcM6LshCY425TqYHJw1lzJF3jqCWc KhtCVnm+GAv0ju7k8UR5iBPRsOzGMQfLJPWrFGB5ERe7WN+Ksy4yzGOAvKIZaIlB 2G7ggm+deKWmh6D2gDtd6TLulIAg0oiItdG1bXoqcE8KQUKxjPhkFxWrvOwO3B2k HaHtzbKfv4P0/H1Uv4SP =FovE -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.