Bug 722672 - (CVE-2012-6130, CVE-2012-6131, CVE-2012-6132) CVE-2012-6130 CVE-2012-6131 CVE-2012-6132 roundup: Multiple cross-site scripting (XSS) and possibly other security related issues corrected in upstream 1.4.20 version
CVE-2012-6130 CVE-2012-6131 CVE-2012-6132 roundup: Multiple cross-site script...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
Unspecified Unspecified
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20120515,repor...
: FutureFeature, Security, Triaged
Depends On: 875311
Blocks:
  Show dependency treegraph
 
Reported: 2011-07-16 06:45 EDT by Upstream Release Monitoring
Modified: 2016-11-08 10:55 EST (History)
6 users (show)

See Also:
Fixed In Version: roundup 1.4.20
Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-04-10 15:47:35 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Upstream Release Monitoring 2011-07-16 06:45:43 EDT
Latest upstream release: 1.4.19
Current version in Fedora Rawhide: 1.4.15
URL: http://pypi.python.org/packages/source/r/roundup

Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Comment 1 Upstream Release Monitoring 2012-05-16 06:44:29 EDT
Latest upstream release: 1.4.20
Current version in Fedora Rawhide: 1.4.18
URL: http://pypi.python.org/packages/source/r/roundup

Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Comment 2 Michel Alexandre Salim 2012-11-08 22:17:31 EST
*URGENT* Upstream classifies this as a security release -- could this be updated soon?

http://pypi.python.org/pypi/roundup
Comment 3 Fedora Update System 2012-11-09 05:41:10 EST
roundup-1.4.20-1.fc17 has been submitted as an update for Fedora 17.
https://admin.fedoraproject.org/updates/roundup-1.4.20-1.fc17
Comment 4 Fedora Update System 2012-11-09 05:41:20 EST
roundup-1.4.20-1.fc16 has been submitted as an update for Fedora 16.
https://admin.fedoraproject.org/updates/roundup-1.4.20-1.fc16
Comment 5 Fedora Update System 2012-11-09 05:41:30 EST
roundup-1.4.20-1.fc18 has been submitted as an update for Fedora 18.
https://admin.fedoraproject.org/updates/roundup-1.4.20-1.fc18
Comment 6 Fedora Update System 2012-11-09 16:09:05 EST
Package roundup-1.4.20-1.fc18:
* should fix your issue,
* was pushed to the Fedora 18 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing roundup-1.4.20-1.fc18'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2012-17916/roundup-1.4.20-1.fc18
then log in and leave karma (feedback).
Comment 7 Michel Alexandre Salim 2012-11-10 00:56:06 EST
The updates should probably be marked as security instead of as bugfix?

Not sure if there are any CVEs associated with this though.
Comment 8 Jan Lieskovsky 2012-11-10 06:45:16 EST
CVE Request:
  http://www.openwall.com/lists/oss-security/2012/11/10/2
Comment 9 Jan Lieskovsky 2012-11-10 07:00:43 EST
Created roundup tracking bugs for this issue

Affects: epel-5 [bug 875311]
Comment 10 Fedora Update System 2012-11-28 00:07:36 EST
roundup-1.4.20-1.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 11 Fedora Update System 2012-11-28 00:08:12 EST
roundup-1.4.20-1.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 12 Vincent Danen 2014-04-10 15:47:35 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2012-6132 to
the following vulnerability:

Name: CVE-2012-6132
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6132
Assigned: 20121206
Reference: http://www.openwall.com/lists/oss-security/2012/11/10/2
Reference: http://www.openwall.com/lists/oss-security/2013/02/13/8
Reference: https://bugzilla.redhat.com/show_bug.cgi?id=722672
Reference: XF:roundup-cve20126132-otk-xss(84191)
Reference: http://xforce.iss.net/xforce/xfdb/84191

Cross-site scripting (XSS) vulnerability in Roundup before 1.4.20
allows remote attackers to inject arbitrary web script or HTML via the
otk parameter.:
Comment 13 Murray McAllister 2014-04-14 01:30:29 EDT
These issues have more CVEs assigned:

> [B] * issue2550684 Fix XSS vulnerability when username contains
> HTML code, thanks to Thomas Arendsen Hein for reporting and patch.
> (Ralf) [4] http://issues.roundup-tracker.org/issue2550684

Please use CVE-2012-6130 for this issue

> [C] * issue2550711 Fix XSS vulnerability in @action parameter, 
> thanks to "om" for reporting. (Ralf) [5]
> http://issues.roundup-tracker.org/issue2550711

Please use CVE-2012-6131 for this issue

References: http://www.openwall.com/lists/oss-security/2012/11/10/2 and http://www.openwall.com/lists/oss-security/2013/02/13/8

Note You need to log in before you can comment on or make changes to this bug.