Your message dated Wed, 28 Jan 2009 17:17:24 +0000
with message-id <e1lse2w-00060j...@ries.debian.org>
and subject line Bug#513158: fixed in moin 1.7.1-3+lenny1
has caused the Debian Bug report #513158,
regarding CVE-2009-0260: Multiple cross-site scripting vulnerabilities
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
513158: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513158
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: python-moinmoin
Severity: grave
Tags: security, patch
Justification: user security hole

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for moin.

CVE-2009-0260[0]:
| Multiple cross-site scripting (XSS) vulnerabilities in
| action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers
| to inject arbitrary web script or HTML via an AttachFile action to the
| WikiSandBox component with (1) the rename parameter or (2) the drawing
| parameter (aka the basename variable).

The upstream patch can be found here[1]. Please note that despite the
CVE description, version 1.8.1 in sid is still vulnerable.

Also, I haven't looked at the attack vector yet, but if we end up fixing
this for stable as well, we should adjust the wikiutil.escape function
to also take care of single quotes "'".
However, the patch should be trivial as well.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

Cheers
Steffen

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0260
    http://security-tracker.debian.net/tracker/CVE-2009-0260
[1] http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1



--- End Message ---
--- Begin Message ---
Source: moin
Source-Version: 1.7.1-3+lenny1

We believe that the bug you reported is fixed in the latest version of
moin, which is due to be installed in the Debian FTP archive:

moin_1.7.1-3+lenny1.diff.gz
  to pool/main/m/moin/moin_1.7.1-3+lenny1.diff.gz
moin_1.7.1-3+lenny1.dsc
  to pool/main/m/moin/moin_1.7.1-3+lenny1.dsc
python-moinmoin_1.7.1-3+lenny1_all.deb
  to pool/main/m/moin/python-moinmoin_1.7.1-3+lenny1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 513...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steffen Joeris <wh...@debian.org> (supplier of updated moin package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 28 Jan 2009 00:45:45 +0000
Source: moin
Binary: python-moinmoin
Architecture: source all
Version: 1.7.1-3+lenny1
Distribution: testing-security
Urgency: high
Maintainer: Jonas Smedegaard <d...@jones.dk>
Changed-By: Steffen Joeris <wh...@debian.org>
Description: 
 python-moinmoin - Python clone of WikiWiki - library
Closes: 513158
Changes: 
 moin (1.7.1-3+lenny1) testing-security; urgency=high
 .
   * Non-maintainer upload by the security team
   * Fix cross-site scripting vulnerability via basename parameter in the
     AttachFile action (Closes: #513158)
     Fixes: CVE-2009-0260
   * Fix cross-site scripting vulnerability in antispam.py via malformed
     content
     Fixes: CVE-2009-0312
Checksums-Sha1: 
 15c3d5151fe0f65120ca560e890cb06770e19ae0 1258 moin_1.7.1-3+lenny1.dsc
 5a9a83cdbc8546b95e8bb2da65e1da3595328f7c 5468224 moin_1.7.1.orig.tar.gz
 d3cb0aef4e456f3b06ca4a86c1ca795281b202b0 78017 moin_1.7.1-3+lenny1.diff.gz
 2928c519b919414e8fa5e6cf3f904d1829fad269 4506252 
python-moinmoin_1.7.1-3+lenny1_all.deb
Checksums-Sha256: 
 2acd624a37f22a6f1dc237dd6665c4c198dcde63d97b65a99476db105068e25c 1258 
moin_1.7.1-3+lenny1.dsc
 f2818bf700257c240962a4861b4cb1bc200ee51aa7390f90fdd345db8e8d79d7 5468224 
moin_1.7.1.orig.tar.gz
 e897939802d09fd94cebf817d0cd238a31f11a45cec59bd18fe3db81dec37872 78017 
moin_1.7.1-3+lenny1.diff.gz
 d55f4a8c872aa3a5bdd3c23457f37feeeedf7240430b27374e658b7bbc77b8da 4506252 
python-moinmoin_1.7.1-3+lenny1_all.deb
Files: 
 e02e1ad207b6e7e62b40d17547273c79 1258 net optional moin_1.7.1-3+lenny1.dsc
 871337b8171c91f9a6803e5376857e8d 5468224 net optional moin_1.7.1.orig.tar.gz
 0528448fc25e1c6e8920189348fc31cb 78017 net optional moin_1.7.1-3+lenny1.diff.gz
 cf54ab3971f533e7189ede0a659567fc 4506252 python optional 
python-moinmoin_1.7.1-3+lenny1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkl/s+QACgkQ62zWxYk/rQc8dQCfWFH9Pyd9i6tUIq2hCkvZpfY9
+BoAnApE3b/Pq6Sh+l2fmAjnhgGCSNbI
=3ETI
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to