PacketFence - BTS - PacketFence |
View Issue Details |
|
ID | Project | Category | View Status | Date Submitted | Last Update |
0001292 | PacketFence | security | public | 2011-10-03 11:03 | 2011-10-24 20:17 |
|
Reporter | mattd | |
Assigned To | obilodeau | |
Priority | normal | Severity | major | Reproducibility | always |
Status | closed | Resolution | fixed | |
Platform | | OS | | OS Version | |
Product Version | devel | |
Target Version | 3.0.2 | Fixed in Version | 3.0.2 | |
fixed in git revision | |
fixed in mtn revision | b3af2b197670c53ffb3992f3d14fbb028b35b927 |
|
Summary | 0001292: XSS in web adminstration interface (login.php) |
Description | In the web administation login page (html/admin/login.php), the 'p' parameter, passed in as a HTTP GET parameter, is not properly escaped in the output. This leads to XSS. |
Steps To Reproduce | |
Additional Information | A sample request, triggering the XSS:
login.php?p=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E%3Cx%20x%3D%22 |
Tags | No tags attached. |
Relationships | |
Attached Files | security-fix-1292.patch (886) 2011-10-11 14:17 https://www.packetfence.org/bugs/file_download.php?file_id=107&type=bug |
|
Issue History |
Date Modified | Username | Field | Change |
2011-10-03 11:03 | mattd | New Issue | |
2011-10-03 11:05 | obilodeau | Status | new => assigned |
2011-10-03 11:05 | obilodeau | Assigned To | => obilodeau |
2011-10-03 11:06 | obilodeau | Note Added: 0002310 | |
2011-10-06 13:46 | obilodeau | Note Added: 0002328 | |
2011-10-07 22:06 | mattd | Note Added: 0002331 | |
2011-10-11 14:17 | obilodeau | mtn revision | => b3af2b197670c53ffb3992f3d14fbb028b35b927 |
2011-10-11 14:17 | obilodeau | Note Added: 0002332 | |
2011-10-11 14:17 | obilodeau | Status | assigned => resolved |
2011-10-11 14:17 | obilodeau | Fixed in Version | => +1 |
2011-10-11 14:17 | obilodeau | Resolution | open => fixed |
2011-10-11 14:17 | obilodeau | File Added: security-fix-1292.patch | |
2011-10-17 10:37 | obilodeau | Note Added: 0002362 | |
2011-10-24 16:45 | obilodeau | View Status | private => public |
2011-10-24 20:15 | obilodeau | Target Version | => 3.0.2 |
2011-10-24 20:15 | obilodeau | Note Added: 0002386 | |
2011-10-24 20:16 | obilodeau | Status | resolved => closed |
2011-10-24 20:17 | obilodeau | Fixed in Version | +1 => 3.0.2 |
Notes |
|
|
Thanks for the report! We will fix this shortly. |
|
|
|
Ok, I'm looking at these now but first:
- Do you plan on getting CVE numbers for the vulnerabilities?
- Can you send me your full name and organization (optional) for the finding credits in the release notes.
Thanks, |
|
|
(0002331)
|
mattd
|
2011-10-07 22:06
|
|
CVEs: Nope, I think it'd be better if you as vendor get them.
Credit: Matthew Daley.
Thanks! |
|
|
|
Fix committed in revno: b3af2b197670c53ffb3992f3d14fbb028b35b927
I requested CVE numbers.
Fix will be released in 3.0.2 shortly.
Those you can't wait or who won't upgrade in a timely fashion should apply the attached patch. It should apply cleanly on most packetfence versions known to man (it's long standing vuln). |
|
|
|
This vulnerability has been assigned: CVE-2011-4067 |
|
|
|
|