|
Message-ID: <CAHmME9rzmkJNNF+bADWzfNYEDoY8jpsJNPFb4YW6r7N9ecjrGg@mail.gmail.com> Date: Fri, 28 Dec 2012 09:04:49 +0100 From: "Jason A. Donenfeld" <Jason@...c4.com> To: oss-security <oss-security@...ts.openwall.com> Cc: Frederick Townes <ftownes@...edge.com> Subject: CVE Request: W3 Total Cache - public cache exposure Hi Kurt, W3 Total Cache: http://wordpress.org/extend/plugins/w3-total-cache/ CVE request for three separate issues: 1. Cache allows directory listing of hash-key listings, exposing hash keys. 2. Hash keys are easily predictable, in the case of (1) not existing. 3. Cached database values are downloadable by their hash keys on the public internet, exposing sensitive information like password hashes. Fixing (3) mitigates (1) and (2), so assign this either three CVEs or one CVE. Source: http://seclists.org/fulldisclosure/2012/Dec/242 The vendor, copied on this email, currently has not issued a fix. Thanks, Jason
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.