Your message dated Tue, 11 Jan 2005 04:35:33 -0800
with message-id <[EMAIL PROTECTED]>
and subject line [EMAIL PROTECTED]: STG Security Advisory: [SSA-20041122-12] 
Zwiki XSS vulnerability]
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 25 Nov 2004 14:57:15 +0000
>From [EMAIL PROTECTED] Thu Nov 25 06:57:15 2004
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CXL3b-0004ky-00; Thu, 25 Nov 2004 06:57:15 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
        id 9E29B366B75; Thu, 25 Nov 2004 15:57:13 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
        from infodrom.org by finlandia.Infodrom.North.DE
        via smail from stdin
        id <[EMAIL PROTECTED]>
        for [EMAIL PROTECTED]; Thu, 25 Nov 2004 15:54:42 +0100 (CET) 
Date: Thu, 25 Nov 2004 15:54:42 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: STG Security Advisory: [SSA-20041122-12] Zwiki XSS 
vulnerability]
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Content-Transfer-Encoding: quoted-printable
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.7 required=4.0 tests=BAYES_40,HAS_PACKAGE,
        HTML_MESSAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: zope-zwiki
Version: woody, sid, sarge
Tags: security, upstream
Severity: grave

----- Forwarded message from [EMAIL PROTECTED] -----

Date: 24 Nov 2004 03:00:25 -0000
From: [EMAIL PROTECTED]
To: [email protected]
Subject: STG Security Advisory: [SSA-20041122-12] Zwiki XSS vulnerability
X-Folder: [EMAIL PROTECTED]



STG Security Advisory: [SSA-20041122-12] Zwiki XSS vulnerability

Revision 1.1
Date Published: 2004-11-22 (KST)
Last Update: 2004-11-22
Disclosed by SSR Team ([EMAIL PROTECTED])

Summary
=3D=3D=3D=3D=3D=3D=3D=3D
Zwiki is a wiki clone in zope. It has a cross site scripting vulnerabilit=
y.

Vulnerability Class
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Implementation Error: Input validation flaw

Details
=3D=3D=3D=3D=3D=3D=3D
Due to an input validation flaw, the Zwiki is vulnerable to cross site
scripting attacks.

cf. http://zwiki.org/925ZwikiXSSVulnerability

proof of concept
http://[victim]/<img src=3Djavascript:alert('hi')>

Impact
=3D=3D=3D=3D=3D=3D
Medium: Malicious attackers can inject and execute arbitrary script code =
in
a user's browser session in context of an affected site.

Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
There is no known workaround at this time.

Affected Products
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Zwiki 0.36.2 and prior

Vendor Status: NOT FIXED
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
2004-10-01 Vulnerability found.
2004-10-01 Zwiki developer notified.
2004-11-22 Official release.

Credits
=3D=3D=3D=3D=3D=3D
Jeremy Bae at STG Security

----- End forwarded message -----

--=20
A mathematician is a machine for converting coffee into theorems.   Paul =
Erd=F6s

Please always Cc to me when replying to me on the lists.

---------------------------------------
Received: (at 282944-done) by bugs.debian.org; 11 Jan 2005 12:35:33 +0000
>From [EMAIL PROTECTED] Tue Jan 11 04:35:33 2005
Return-path: <[EMAIL PROTECTED]>
Received: from dsl093-039-086.pdx1.dsl.speakeasy.net (localhost.localdomain) 
[66.93.39.86] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CoLFF-0008DU-00; Tue, 11 Jan 2005 04:35:33 -0800
Received: by localhost.localdomain (Postfix, from userid 1000)
        id 7B103171D3B; Tue, 11 Jan 2005 04:35:33 -0800 (PST)
Date: Tue, 11 Jan 2005 04:35:33 -0800
From: Steve Langasek <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: STG Security Advisory: [SSA-20041122-12] Zwiki XSS 
vulnerability]
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="6zdv2QT/q3FMhpsV"
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--6zdv2QT/q3FMhpsV
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Version 0.37.0-2 of zope-zwiki has reached sarge, so I think this bug can be
closed.

Thanks,
--=20
Steve Langasek
postmodern programmer

--6zdv2QT/q3FMhpsV
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFB48gSKN6ufymYLloRAvX9AJ0QX5P3Fq2QlzGK7J4D7mfj2Df3mwCgvN1r
X0CFbDH8gfohoBp0mGgDlFQ=
=DBwj
-----END PGP SIGNATURE-----

--6zdv2QT/q3FMhpsV--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to