A persistent / stored cross-site scripting (XSS) flaw was found in the way reviews dropdown of Review Board, a web-based code review tool, performed sanitization of certain user information (full name). A remote attacker could provide a specially-crafted URL that, when visited would lead to arbitrary HTML or web script execution in the context of Review Board user's session. References: [1] http://www.reviewboard.org/docs/releasenotes/reviewboard/1.7.10/ [2] http://www.reviewboard.org/docs/releasenotes/reviewboard/1.6.17/ [3] http://www.reviewboard.org/news/2013/06/22/review-board-1617-and-1710-released/
Upstream patch: [4] https://github.com/reviewboard/reviewboard/commit/4aaacbb1e628a80803ba1a55703db38fccdf7dbf
This issue affects the versions of the ReviewBoard package, as shipped with Fedora release of 17 and 18. Please schedule an update. -- This issue affects the versions of the ReviewBoard package, as shipped with Fedora EPEL-6. Please schedule an update.
Created ReviewBoard tracking bugs for this issue Affects: fedora-all [bug 977428] Affects: epel-6 [bug 977429]
CVE Request: http://www.openwall.com/lists/oss-security/2013/06/24/1
The CVE identifier of CVE-2013-2209 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2013/06/24/2
ReviewBoard-1.7.11-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
ReviewBoard-1.7.11-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
ReviewBoard-1.7.11-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.