Bug#661993: CVE-2011-2191: persistent CSRF on admin interface

2016-06-22 Thread Jonathan Wiltshire
Package: src:cherokee

Dear maintainer,

Recently you fixed one or more security problems and as a result you closed
this bug. These problems were not serious enough for a Debian Security
Advisory, so they are now on my radar for fixing in the following suites
through point releases:

squeeze (6.0.8) - use target "oldstable"

Please prepare a minimal-changes upload targetting each of these suites,
and submit a debdiff to the Release Team [0] for consideration. They will
offer additional guidance or instruct you to upload your package.

I will happily assist you at any stage if the patch is straightforward and
you need help. Please keep me in CC at all times so I can
track [1] the progress of this request.

For details of this process and the rationale, please see the original
announcement [2] and my blog post [3].

0: debian-rele...@lists.debian.org
1: http://prsc.debian.net/tracker/661993/
2: <201101232332.11736.th...@debian.org>
3: http://deb.li/prsc

Thanks,

with his security hat on:
--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51



Bug#661993: CVE-2011-2191: persistent CSRF on admin interface

2012-03-09 Thread Gunnar Wolf
tags 661993 + upstream, help, confirmed

Hi,

Although the impact of this security bug is not too high (as a series
of conditions should be present, which are usually not there), it is a
real bug with real implications. I am tempted to downgrade it, as it
is only dangerous in very specific situations, but at least for now
I'll leave it as serious. The upstream author is informed about this
bug, but has not been able to find a way to fix it while keeping
cherokee-admin's full functionality:

   http://www.openwall.com/lists/oss-security/2011/06/06/13

The RedHat bugtracker lists this bug as dealt with, but it seems to me
it regards just one of the two defects reported in the bug – And not
this one:

   https://bugzilla.redhat.com/show_bug.cgi?id=713304

Thanks,


signature.asc
Description: Digital signature


Bug#661993: CVE-2011-2191: persistent CSRF on admin interface

2012-03-03 Thread Helmut Grohne
Source: cherokee
Version: 1.2.101-1
Severity: serious
Tags: security

References:
CVE-2011-2191
https://bugs.launchpad.net/ubuntu/+source/cherokee/+bug/784632
https://bugzilla.redhat.com/show_bug.cgi?id=713304

Please verify whether the issue is still present in the package. A quick
look at admin/PageVServers.py suggests that this is the case, because
the Commit function stores new_nick without any validation. Even though
the value is escaped on some accesses admin/PageStatus.py Render_Content
does not perform escaping.

Helmut



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org