A cross-site scripting (XSS) flaw was found in the way the commenting system of the ReviewBoard, a web-based code review tool, sanitized user input (new comments to be loaded). A remote attacker could provide a specially-crafted URL, which once visited by valid ReviewBoard user could lead to arbitrary HTML or web script execution in the 'diff viewer' or 'screenshot pages' components. References: [1] http://www.reviewboard.org/news/ [2] http://www.reviewboard.org/docs/releasenotes/dev/reviewboard/1.6.3/ Relevant upstream patch: [3] https://github.com/reviewboard/reviewboard/commit/7a0a9d94555502278534dedcf2d75e9fccce8c3d
This issue has been scheduled to be corrected by the following ReviewBoard package updates: 1) ReviewBoard-1.5.7-1.fc15 for Fedora 15 version, 2) ReviewBoard-1.5.7-1.el6 for Fedora EPEL 6 version, 3) ReviewBoard-1.5.7-1.el5 for Fedora EPEL 5 version. This issue affects the version of the ReviewBoard package, as shipped with Fedora release of 16. Please schedule an update.
Created ReviewBoard tracking bugs for this issue Affects: fedora-all [bug 754130]
CVE request: [4] http://www.openwall.com/lists/oss-security/2011/11/15/8
The CVE identifier of CVE-2011-4312 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2011/11/15/9