On Fri, 20 Nov 2009 22:19:31 +0200, Niko Tyni wrote:
> On Thu, Jan 01, 1970 at 12:00:00AM +0000, Niko Tyni wrote:
> > On Wed, Nov 04, 2009 at 10:08:37PM -0500, Michael Gilbert wrote:
> > > see [0] for a link to a patch for the 2007 issue.  see [1] for info and a 
> > > link to a 1.5 version with the backported fix for the 2008 issue.
> >  
> > > [0] http://dev.rubyonrails.org/ticket/7910
> > > [1] 
> > > http://prototypejs.org/2008/1/25/prototype-1-6-0-2-bug-fixes-performance-improvements-and-security
> 
> Thanks Michael.
> 
> Given that the smokeping versions in Debian don't use JSON at all and
> definitely don't have a server side component that sends it, I don't
> see any attack vector for these vulnerabilities. Am I missing something?

i've never used smokeping before, so i'm not very familiar with it.  i
mainly work security issues, and for this one i've only spent enough
time to determine whether the vulnerable code is present and nothing
more. since you are the maintainer, you are in a much better position
to correctly assess the impact and severity of the problem, so i will
defer to your judgment.

> (Smokeping is only using prototype.js through the scriptaculous library,
> which gets used through cropper, which is a client-side image cropper UI.)

is this functionality at all exposed through the web interface or
could it be exposed via other unanticipated ways or via files (cgi or
other) served through the web interface?

if after checking and thoroughly reviewing all of the references
(specifically the "javascript hijacking" reference in CVE-2007-2383) you
feel that the package is not affected due to the library being used
only in a safe manner, then please feel free to close the bug.

thanks!
mike



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to