CVE-2013-7303: XSS on author

Related Vulnerabilities: CVE-2013-7303  

Debian Bug report logs - #736170
CVE-2013-7303: XSS on author

version graph

Package: spip; Maintainer for spip is David Prévot <taffit@debian.org>; Source for spip is src:spip (PTS, buildd, popcon).

Reported by: David Prévot <taffit@debian.org>

Date: Mon, 20 Jan 2014 17:39:01 UTC

Severity: important

Tags: patch, security, upstream

Fixed in versions spip/3.0.13-1, spip/2.1.17-1+deb7u3, spip/2.1.1-3squeeze8

Done: David Prévot <taffit@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, SPIP packaging team <spip-maintainers@lists.alioth.debian.org>:
Bug#736170; Package spip. (Mon, 20 Jan 2014 17:39:05 GMT) (full text, mbox, link).


Acknowledgement sent to David Prévot <taffit@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, SPIP packaging team <spip-maintainers@lists.alioth.debian.org>. (Mon, 20 Jan 2014 17:39:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: David Prévot <taffit@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2013-7303: XSS on author
Date: Mon, 20 Jan 2014 13:35:17 -0400
[Message part 1 (text/plain, inline)]
Package: spip
Severity: important
Tags: security patch upstream
Control: fixed -1 3.0.13-1

Hi,

A minor security issue has just been fixed upstream in the 2.1 branch,
and is already fixed in Sid and Jessie. After a quick exchange with the
security team (RT#4911), we agreed it’s not worth a DSA (so I’ll request
two pu shortly).

Regards

David

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (110, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.12-1-rt-amd64 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages spip depends on:
ii  apache2                2.4.7-1
ii  apache2-bin [httpd]    2.4.7-1
ii  debconf [debconf-2.0]  1.5.52
ii  fonts-dustin           20030517-10
ii  libjs-excanvas         0.r3-3
ii  libjs-ie7              2.1~beta4-1
ii  libjs-jquery           1.7.2+dfsg-3
ii  libjs-jquery-cookie    8-2
ii  libjs-jquery-flot      0.8.1+dfsg-2
ii  libjs-jquery-form      8-2
ii  libjs-jquery-ui        1.10.1+dfsg-1
ii  libphp-pclzip          2.8.2-2
ii  php-html-safe          0.10.1-2
ii  php-xml-htmlsax3       3.0.0+really3.0.0-1
ii  php5                   5.5.8+dfsg-2
ii  php5-mysql             5.5.8+dfsg-2
ii  w3c-dtd-xhtml          1.2-4

Versions of packages spip recommends:
ii  imagemagick   8:6.7.7.10-7
ii  mysql-server  5.5.35+dfsg-1
ii  netpbm        2:10.0-15+b2
ii  php5-sqlite   5.5.8+dfsg-2

spip suggests no packages.

-- debconf information excluded
[signature.asc (application/pgp-signature, inline)]

Marked as fixed in versions spip/3.0.13-1. Request was from David Prévot <taffit@debian.org> to submit@bugs.debian.org. (Mon, 20 Jan 2014 17:39:06 GMT) (full text, mbox, link).


Reply sent to David Prévot <taffit@debian.org>:
You have taken responsibility. (Tue, 21 Jan 2014 22:18:22 GMT) (full text, mbox, link).


Notification sent to David Prévot <taffit@debian.org>:
Bug acknowledged by developer. (Tue, 21 Jan 2014 22:18:22 GMT) (full text, mbox, link).


Message #12 received at 736170-close@bugs.debian.org (full text, mbox, reply):

From: David Prévot <taffit@debian.org>
To: 736170-close@bugs.debian.org
Subject: Bug#736170: fixed in spip 2.1.17-1+deb7u3
Date: Tue, 21 Jan 2014 22:17:05 +0000
Source: spip
Source-Version: 2.1.17-1+deb7u3

We believe that the bug you reported is fixed in the latest version of
spip, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 736170@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
David Prévot <taffit@debian.org> (supplier of updated spip package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 20 Jan 2014 14:36:37 -0400
Source: spip
Binary: spip
Architecture: source all
Version: 2.1.17-1+deb7u3
Distribution: wheezy
Urgency: medium
Maintainer: SPIP packaging team <spip-maintainers@lists.alioth.debian.org>
Changed-By: David Prévot <taffit@debian.org>
Description: 
 spip       - website engine for publishing
Closes: 736170
Changes: 
 spip (2.1.17-1+deb7u3) wheezy; urgency=medium
 .
   * Document fixed #729172
   * Document CVE in previous changelog entries
   * Fix XSS on signature from author [CVE-2013-7303] (Closes: #736170)
Checksums-Sha1: 
 98ef279ea335dc59d57d131d895476c783f5ffd0 1562 spip_2.1.17-1+deb7u3.dsc
 89e02c2597ee341c990b3f422e9507bfed37b7fe 65412 spip_2.1.17-1+deb7u3.debian.tar.gz
 37e0c01ed80eee52733e28669619fd776574fe1a 3875562 spip_2.1.17-1+deb7u3_all.deb
Checksums-Sha256: 
 b012684d548bb7504dbdd208b403d6f7e3525bf062ec34abedc8fd0bbfd8fabc 1562 spip_2.1.17-1+deb7u3.dsc
 9ea72c0476a81bdb8d1c987ab0c027a87b56c0818655fe1adca14aa45e17414d 65412 spip_2.1.17-1+deb7u3.debian.tar.gz
 ab3cb786234015c807eff3fff5ed58f679d31ece40ec55444a65894c88a458ea 3875562 spip_2.1.17-1+deb7u3_all.deb
Files: 
 4526ba3d6c1fe7d62779963ba6c3cd8d 1562 web extra spip_2.1.17-1+deb7u3.dsc
 a52e2ce3055dce5553bed0a3fe6a439b 65412 web extra spip_2.1.17-1+deb7u3.debian.tar.gz
 5cdfbe6894b203e9bb72debd69b942a9 3875562 web extra spip_2.1.17-1+deb7u3_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJS3W5rAAoJEAWMHPlE9r08svsH/0m0Hh8i3mSubU585/9+YgHc
xM77tfJgA4x0aN7mq2KpdzFPYSTSdxmt6PxQ57/2XazRwfGnSQ9Cxsyl0b2OtWOt
WfIN6y42CnIkfuh5SxFaEOHPE5acUwQlUs0U89Evtxm64yY2BWpFHEtGlPdNkWUE
LjROt+oMyqeIABIBoFMlrk1XF9BodadoddN1meNccyv94gwC2BomafVKX97RJzAg
7sTWEpQ9iwHLs8syDHGXtyGd1tw21AHKhhA/4SchLiP7NQhuac80hfZB+OpvehQu
Fcqxlzpgm3KRQ8amkklbck9caX6wmw6BM+YS2NqMM3o9tnIYZnlxy2X9TeweJlk=
=U7pA
-----END PGP SIGNATURE-----




Reply sent to David Prévot <taffit@debian.org>:
You have taken responsibility. (Tue, 21 Jan 2014 22:18:26 GMT) (full text, mbox, link).


Notification sent to David Prévot <taffit@debian.org>:
Bug acknowledged by developer. (Tue, 21 Jan 2014 22:18:26 GMT) (full text, mbox, link).


Message #17 received at 736170-close@bugs.debian.org (full text, mbox, reply):

From: David Prévot <taffit@debian.org>
To: 736170-close@bugs.debian.org
Subject: Bug#736170: fixed in spip 2.1.1-3squeeze8
Date: Tue, 21 Jan 2014 22:17:33 +0000
Source: spip
Source-Version: 2.1.1-3squeeze8

We believe that the bug you reported is fixed in the latest version of
spip, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 736170@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
David Prévot <taffit@debian.org> (supplier of updated spip package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 20 Jan 2014 14:42:46 -0400
Source: spip
Binary: spip
Architecture: source all
Version: 2.1.1-3squeeze8
Distribution: squeeze
Urgency: medium
Maintainer: SPIP packaging team <spip-maintainers@lists.alioth.debian.org>
Changed-By: David Prévot <taffit@debian.org>
Description: 
 spip       - website engine for publishing
Closes: 736170
Changes: 
 spip (2.1.1-3squeeze8) squeeze; urgency=medium
 .
   * Document fixed #729172
   * Document CVE in previous changelog entries
   * Fix XSS on signature from author [CVE-2013-7303] (Closes: #736170)
Checksums-Sha1: 
 74175bde53445074865b101b5e51bf1947678194 1407 spip_2.1.1-3squeeze8.dsc
 91fd4ff729d82c76d60651ca935bbdf6e7e0dc1f 27539 spip_2.1.1-3squeeze8.diff.gz
 058d8f8bde833ab84b0fcd70b4948a73adcbd7f5 3870210 spip_2.1.1-3squeeze8_all.deb
Checksums-Sha256: 
 8c5745c7fc2932cc27ed69ae2c28cf521807c1a558d47a3ae4b6416d554a5b19 1407 spip_2.1.1-3squeeze8.dsc
 077f1b88de1a25a76e22e33b924e397b6eb2f9bb8232ea9975d8de950fa8273d 27539 spip_2.1.1-3squeeze8.diff.gz
 357cdff7d145ca3c88ecd4feffce45e668eeb96cfcdc2826772b968956514a96 3870210 spip_2.1.1-3squeeze8_all.deb
Files: 
 1deb9b8cea7202d83bf63ce8e21e458c 1407 web extra spip_2.1.1-3squeeze8.dsc
 e093a615c68f9658a87556b612dcbc87 27539 web extra spip_2.1.1-3squeeze8.diff.gz
 cdd4c15062dd51a544065d60ab99f9d5 3870210 web extra spip_2.1.1-3squeeze8_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEbBAEBCAAGBQJS3W9CAAoJEAWMHPlE9r08b+sH+PX/VIl/WwXirFdXhHhgSjxq
NLUoJeJAYFOMqKD3ysWFnEzP6Ypav3mj/yygbYNArTOQBar6qx4QclpmVKGo/8QR
9B2xhdZe34zy+viCenjYYHlN1olueh4DDNwEqnB5vnoGhXupncLE2fFvdGq5VLJR
Hd4MJXfVWleH9a+IJ6nQlgNPcU1xaJJ5T7/PiZCa32sbWorhdNAtgl5LI3TzGR/7
gOYJQrR2MVagSp63yF7drkV34e4k/35Jpe6UYoXVXl58wlBts7Z/rX1bworSOG5G
Z1yi+uMwDlt+m6v+lgWIdmCKGe9EtajqAy58tYTAx0DNauEIiSA9mgHYfSBoFw==
=7WlM
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Wed, 19 Feb 2014 07:35:53 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:47:01 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.