English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 114770 CVE descriptions
and 58768 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-9260
2010-05-31 17:41:36
--------------------------------------------------------------------------------

Name        : xinha
Product     : Fedora 12
Version     : 0.96.1
Release     : 1.fc12
URL         : http://www.xinha.org
Summary     : A WYSIWIG HTML editor component in Javascript
Description :
Xinha is a Javascript component that can be used to enhance a textarea field in
HTML. It can be used on its own or as part of a larger WYSIWYG module such as
Scribite.

--------------------------------------------------------------------------------
Update Information:

Name: CVE-2010-1916  URL: http://cve.mitre.org/cgi-
bin/cvename.cgi?name=CVE-2010-1916  Assigned: 20100511  Reference: MISC:
http://www.php-security.org/2010/05/10/mops-2010-019-serendipity-wysiwyg-editor-
plugin-configuration-injection-vulnerability/index.html  Reference: MISC:
http://www.php-security.org/2010/05/10/mops-2010-020-xinha-wysiwyg-plugin-
configuration-injection-vulnerability/index.html    The dynamic configuration
feature in Xinha WYSIWYG editor 0.96 Beta 2  and earlier, as used in Serendipity
1.5.2 and earlier, allows remote  attackers to bypass intended access
restrictions and modify the  configuration of arbitrary plugins via (1) crafted
backend_config_secret_key_location and backend_config_hash parameters  that are
used in a SHA1 hash of a shared secret that can be known or  externally
influenced, which are not properly handled by the  "Deprecated config passing"
feature; or (2) crafted backend_data and  backend_data[key_location] variables,
which are not properly handled  by the xinha_read_passed_data function.  NOTE:
this can be leveraged to  upload and possibly execute arbitrary files via
config.inc.php in the  ImageManager plugin.
--------------------------------------------------------------------------------
ChangeLog:

* Sat May 29 2010 Rakesh Pandit <rakesh@fedoraproject.org> - 0.96.1-1
- Updated to 0.96.1
- CVE-2010-1916 xinha: access restriction bypass [MOPS 2010-020]
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #591701 - CVE-2010-1916 xinha: access restriction bypass [MOPS 2010-020]
        https://bugzilla.redhat.com/show_bug.cgi?id=591701
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update xinha' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.