Your message dated Mon, 09 Feb 2009 21:35:42 +0000
with message-id <e1lwdn4-0003d3...@ries.debian.org>
and subject line Bug#513158: fixed in moin 1.5.3-1.2etch2
has caused the Debian Bug report #513158,
regarding CVE-2009-0260: Multiple cross-site scripting vulnerabilities
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
513158: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513158
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: python-moinmoin
Severity: grave
Tags: security, patch
Justification: user security hole

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for moin.

CVE-2009-0260[0]:
| Multiple cross-site scripting (XSS) vulnerabilities in
| action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers
| to inject arbitrary web script or HTML via an AttachFile action to the
| WikiSandBox component with (1) the rename parameter or (2) the drawing
| parameter (aka the basename variable).

The upstream patch can be found here[1]. Please note that despite the
CVE description, version 1.8.1 in sid is still vulnerable.

Also, I haven't looked at the attack vector yet, but if we end up fixing
this for stable as well, we should adjust the wikiutil.escape function
to also take care of single quotes "'".
However, the patch should be trivial as well.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

Cheers
Steffen

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0260
    http://security-tracker.debian.net/tracker/CVE-2009-0260
[1] http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1



--- End Message ---
--- Begin Message ---
Source: moin
Source-Version: 1.5.3-1.2etch2

We believe that the bug you reported is fixed in the latest version of
moin, which is due to be installed in the Debian FTP archive:

moin_1.5.3-1.2etch2.diff.gz
  to pool/main/m/moin/moin_1.5.3-1.2etch2.diff.gz
moin_1.5.3-1.2etch2.dsc
  to pool/main/m/moin/moin_1.5.3-1.2etch2.dsc
moinmoin-common_1.5.3-1.2etch2_all.deb
  to pool/main/m/moin/moinmoin-common_1.5.3-1.2etch2_all.deb
python-moinmoin_1.5.3-1.2etch2_all.deb
  to pool/main/m/moin/python-moinmoin_1.5.3-1.2etch2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 513...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steffen Joeris <wh...@debian.org> (supplier of updated moin package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 28 Jan 2009 00:25:56 +0000
Source: moin
Binary: moinmoin-common python-moinmoin
Architecture: source all
Version: 1.5.3-1.2etch2
Distribution: stable-security
Urgency: high
Maintainer: Jonas Smedegaard <d...@jones.dk>
Changed-By: Steffen Joeris <wh...@debian.org>
Description: 
 moinmoin-common - Python clone of WikiWiki - common data
 python-moinmoin - Python clone of WikiWiki - library
Closes: 513158
Changes: 
 moin (1.5.3-1.2etch2) stable-security; urgency=high
 .
   * Non-maintainer upload by the security team
   * Fix cross-site scripting vulnerability via basename parameter in the
     AttachFile action (Closes: #513158)
     Fixes: CVE-2009-0260
   * Extend the wikiutil.escape function to also escape single quotes "'"
     as done in newer versions
   * Fix cross-site scripting vulnerability in antispam.py via malformed
     content
     Fixes: CVE-2009-0312
Files: 
 7b24d6f694511840a0a9da0c9f33f5ad 671 net optional moin_1.5.3-1.2etch2.dsc
 139bcec334ed7fbf1ca2bef3c89a8377 40914 net optional moin_1.5.3-1.2etch2.diff.gz
 a46561072eb0ee26ee1a71275c0e64b3 1595112 net optional 
moinmoin-common_1.5.3-1.2etch2_all.deb
 ab6158ae7010c3701859ceb26bd61bd2 914904 python optional 
python-moinmoin_1.5.3-1.2etch2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkl/pzYACgkQ62zWxYk/rQedCQCeIllA/ZRl15uc0Hr2QKjyd3Xu
P/UAn2SrT9vIprm3xK7krDKU3BtFpt6f
=DojV
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to