oss-security - Re: CVE requests for Review Board

Openwall
Follow @Openwall on Twitter for new release announcements and other news [<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <etPan.53cefe1e.5cc4ca6f.13beb@varia.chipx86.com>
Date: 2014年7月22日 17:13:18 -0700
From: Christian Hammond <christian@...nbaginc.com>
To: cve-assign@...re.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE requests for Review Board
My apologies. We usually go through someone else for CVEs, and he directed us this time to contact this address. We’ll be more careful in the future.
Thanks!
- Christian
-- 
Christian Hammond - christian@...nbaginc.com
Review Board - http://www.reviewboard.org
Beanbag, Inc. - http://www.beanbaginc.com
On July 22, 2014 at 2:40:58 PM, cve-assign@...re.org (cve-assign@...re.org) wrote:
-----BEGIN PGP SIGNED MESSAGE----- 
Hash: SHA1 
> https://www.reviewboard.org/news/2014/07/22/review-board-1-7-27-and-2-0-3-security-releases/ 
> July 22, 2014 - 2:07 AM 
> Review Board 1.7.27 and 2.0.3 security releases 
> One of the security vulnerabilities allowed an attacker to construct a 
> URL that would inject custom JavaScript into the page, which could 
> then be passed to a user, allowing the custom code to run in their 
> session. 
Use CVE-2014-5027. 
> The other vulnerability allowed users without access to a private 
> review request to construct a URL for accessing original or patched 
> files from the repository, if they knew the right series of database 
> IDs. 
Use CVE-2014-5028. 
(Incidentally, we're not sure whether the original request sent July 21 
was within the oss-security list charter. MITRE does not control the list 
charter, but 
http://oss-security.openwall.org/wiki/mailing-lists/oss-security 
says "List Content Guidelines ... Public security issues only please" 
whereas the original request said "two security vulnerabilities ... 
Neither are publicly disclosed." If you want a CVE ID for an 
undisclosed vulnerability in the future -- for example, because you 
want to include the CVE ID number when the 
https://www.reviewboard.org/news/ entry first becomes public -- there 
are other options, such as sending the CVE request directly to 
cve-assign@...re.org instead.) 
- -- 
CVE assignment team, MITRE CVE Numbering Authority 
M/S M300 
202 Burlington Road, Bedford, MA 01730 USA 
[ PGP key available through http://cve.mitre.org/cve/request_id.html ] 
-----BEGIN PGP SIGNATURE----- 
Version: GnuPG v1.4.14 (SunOS) 
iQEcBAEBAgAGBQJTztl7AAoJEKllVAevmvmsFjEH/i3c93xE5j9OKoAH9pgUkAkV 
9VOoEgRoGaHXR2YDxPkEfapYhV7RZhjTcoQlW5oftH7QXE0FsyY7VhXbetn4GMv7 
bEhpzmkfz2kZN0YlBRHZr9FtuOsX8zqe77fHK3lsZsy/nBEh+W8onxZWCvThZvnA 
pucywbiGjkSAIgjKzLBF2YRRs0Xv660td8zZWHz9PunJPH5yWGLi6WywUmtkCidC 
pF22tWpvwJmGorN1kQFYjwavXSeE9jXRFt9kacFmWibA/z2srtMnx8EGgbbV9IrT 
ENjapy6bzUo7oTO0UoALRBnGj2IbO4CvQlKMK0kwudDsplFpb7i/nrTO77uFjQw= 
=STIj 
-----END PGP SIGNATURE----- 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.

AltStyle によって変換されたページ (->オリジナル) /