|
Message-Id: <20151205044256.0BFDB6FC003@smtpvmsrv1.mitre.org> Date: Fri, 4 Dec 2015 23:42:56 -0500 (EST) From: cve-assign@...re.org To: ryandewhurst@...il.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE Request: Magento SWF XSS -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > http://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/ > > DOM based Cross Site Scripting (XSS) > > http://[magento_url]/skin/adminhtml/default/default/media/editor.swf > http://[magento_url]/skin/adminhtml/default/default/media/uploader.swf > http://[magento_url]/skin/adminhtml/default/default/media/uploaderSingle.swf > > editor.swf?bridgeName=[XSS] Use CVE-2014-9758. Often "uploader.swf" XSS reports for various products are a consequence of uploader.swf in old versions of YUI, e.g., CVE-2013-4941. As far as we know, YUI did not ever include editor.swf or uploaderSingle.swf files. We don't know of any relationship between any Magento .swf file and any YUI .swf file, and therefore there is a new CVE. For reference, other .swf filenames associated with YUI 2.x are YUIBridgeProject.swf, charts.swf, connection.swf, datastore.swf, and swfstore.swf. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWYmrxAAoJEL54rhJi8gl5khoP/3JWFnvm1rmKbwimcvJASXgh 42zAhM51FkONJ9B3IXYAUyzwajJ1UAFN80TOImXVIoEF4UNaDqkVm6iEELTQ7wrW +AySRhSinOYP6mfRSGoOpCA8RkNqTagDpjRBqYvMdQTFYBj+B5bxNljogpRZkR4P 0vWS7o29oHa5KtSuqU3+KFbs8s8tdMdciPnJvF77U7JfUTCh5lqNtZSUlas5+VyN ZMCneNLE+mI9Em2+t1hPs/yPeNd/d3fIgQyQStSdBsG6cLE9SnxobaPiKMdrZGGv DAw0/awA1Vr5BuSErpiQHevWIuwjo0M6uhI0T9XFFtwgO0BEg8uyqZPlr5zx9rUd w6ZS7EVy7lIlfxAtJYtOEMXVLa0ix0rSerBgZcK/62lD7D/AqOFq8WhSstLkwI16 vs1yM40zdshJGk17VVrPHzaYBDApVkXGZ2bReOB5FyJhDLNNXrK+KTQmF8StqP7e 0/3Le12IWGLlhuhYjq3TWmxjZDgxaABh/z8Ee981BHDpsqJKAKaTC2SjWNLCETa8 kIRlvt+SxXzJckGuhq+oxAaYxcJvhFCMsZx1IFK/+uq1SPn/kMIqKmdRN6xK5qZX LqZ0jXoI4RKQ6SECtzAKCt3KjiXYB6wXsKtFrca5UDY7AjZIjMSzYD/LTgguOvxK Df382qD22Kat+PdjT8/c =Eg7t -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.