--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-9260
2010-05-31 17:41:36
--------------------------------------------------------------------------------
Name : xinha
Product : Fedora 12
Version : 0.96.1
Release : 1.fc12
URL :
http://www.xinha.org
Summary : A WYSIWIG HTML editor component in Javascript
Description :
Xinha is a Javascript component that can be used to enhance a textarea field in
HTML. It can be used on its own or as part of a larger WYSIWYG module such as
Scribite.
--------------------------------------------------------------------------------
Update Information:
Name: CVE-2010-1916 URL:
http://cve.mitre.org/cgi-
bin/cvename.cgi?name=CVE-2010-1916 Assigned: 20100511 Reference: MISC:
http://www.php-security.org/2010/05/10/mops-2010-019-serendipity-wysiwyg-editor-
plugin-configuration-injection-vulnerability/index.html Reference: MISC:
http://www.php-security.org/2010/05/10/mops-2010-020-xinha-wysiwyg-plugin-
configuration-injection-vulnerability/index.html The dynamic configuration
feature in Xinha WYSIWYG editor 0.96 Beta 2 and earlier, as used in Serendipity
1.5.2 and earlier, allows remote attackers to bypass intended access
restrictions and modify the configuration of arbitrary plugins via (1) crafted
backend_config_secret_key_location and backend_config_hash parameters that are
used in a SHA1 hash of a shared secret that can be known or externally
influenced, which are not properly handled by the "Deprecated config passing"
feature; or (2) crafted backend_data and backend_data[key_location] variables,
which are not properly handled by the xinha_read_passed_data function. NOTE:
this can be leveraged to upload and possibly execute arbitrary files via
config.inc.php in the ImageManager plugin.
--------------------------------------------------------------------------------
ChangeLog:
* Sat May 29 2010 Rakesh Pandit <rakesh@fedoraproject.org> - 0.96.1-1
- Updated to 0.96.1
- CVE-2010-1916 xinha: access restriction bypass [MOPS 2010-020]
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #591701 - CVE-2010-1916 xinha: access restriction bypass [MOPS 2010-020]
https://bugzilla.redhat.com/show_bug.cgi?id=591701
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update xinha' at the command line.
For more information, refer to "Managing Software with yum",
available at
http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce