Bug 895595 (CVE-2012-5650) - CVE-2012-5650 couchdb: DOM based XSS via Futon UI
Summary: CVE-2012-5650 couchdb: DOM based XSS via Futon UI
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-5650
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 895597 895599
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-01-15 15:46 UTC by Jan Lieskovsky
Modified: 2021-10-19 21:58 UTC (History)
1 user (show)

Fixed In Version: APache CouchDB 1.0.4, Apache CouchDB 1.1.2, Apache CouchDB 1.2.1
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-19 21:58:45 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2013-01-15 15:46:47 UTC
A DOM based cross-site scripting (XSS) flaw was found in the way browser-based test suite of Apache CouchDB, a distributed, fault-tolerant and schema-free document-oriented database accessible via a RESTful HTTP/JSON API, processed certain query parameters. A remote attacker could provide a specially-crafted web page that, when accessed could lead to arbitrary web script or HTML execution in the context of a CouchDB user session.

Upstream advisory:
[1] http://mail-archives.apache.org/mod_mbox/couchdb-user/201301.mbox/%3C2FFF2FD7-8EAF-4EBF-AFDA-5AEB6EAC853F@apache.org%3E

Comment 1 Jan Lieskovsky 2013-01-15 15:49:51 UTC
This issue affects the versions of the couchdb package, as shipped with Fedora release of 16 and 17. Please schedule an update.

--

This issue affects the versions of the couchdb package, as shipped with Fedora EPEL 5 and Fedora EPEL 6. Please schedule an update.

Comment 2 Jan Lieskovsky 2013-01-15 15:51:09 UTC
Created couchdb tracking bugs for this issue

Affects: fedora-all [bug 895597]

Comment 3 Jan Lieskovsky 2013-01-15 15:52:12 UTC
Created couchdb tracking bugs for this issue

Affects: epel-all [bug 895599]


Note You need to log in before you can comment on or make changes to this bug.