Hi Steffen,

On Sun, 7 Mar 2010 19:10:12 +1100
Steffen Joeris <steffen.joe...@skolelinux.de> wrote:
> Apparently, to_native() is converting it to another encoding, but shouldn't 
> it 
> do some escaping of certain characters to avoid having the usual html 
> characters in there?

 I'm not sure that, I'll ask upstream author.
 IE has a strange behavior with auto-encoding pages without charset, it probably
 relates that.


> I also don't understand the text on tdiary.org, since it is in Japanese, 
> could 
> you maybe provide a translation?

* Overview
 XSS vulnerability was found in tDiary, a communication-friendly weblog system.
 We think it is rare case but please deal with that as soon as possible if you  
 are using such system.

 - This problem affects 
  * tDiary 2.2.2 or earlier (full set and plugins)
 
    And, if you meet _all_ condition below
  * tb-send.rb plugin is enabled
  * using Microsoft Internet Explorer 7 (IE7)
  * update diary via malicious crafted URL

 We confirmed this problem with update blog by using IE7 (maybe Old Internet 
 Explorer as well but we don't check with that) and it is not showed with 
Firefox, 
 Opera and Safari.

 And it exists with tDiary 2.2, not 2.3. 


* Impact
 An arbitrary script may be executed on some web browsers when blog owner 
 accesses blog update page via special crafted URL or web site by malicious 
 third-parties. 

 It does not affect people who browse blog since this vulnerability exists in 
 its update page only, and is accessible with administrator of that blog. 
 However, there's a danger publish malicious page by exploiting this 
vulnerability. 


* Solutions
 - disable tb-send.rb plugin
 - update product to 2.2.3


* Thanks to
 Project VEX of UBsecure, Inc.

-- 
Regards,

 Hideki Yamane     henrich @ debian.or.jp/iijmio-mail.jp
 http://wiki.debian.org/HidekiYamane

Attachment: pgp7AQdcTQAFT.pgp
Description: PGP signature

Reply via email to