[SECURITY] Fedora 13 Update: xinha-0.96.1-2.fc13

updates at fedoraproject.org updates at fedoraproject.org
Tue Jun 8 19:31:26 UTC 2010


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-9320
2010-05-31 17:43:46
--------------------------------------------------------------------------------

Name        : xinha
Product     : Fedora 13
Version     : 0.96.1
Release     : 2.fc13
URL         : http://www.xinha.org
Summary     : A WYSIWIG HTML editor component in Javascript
Description :
Xinha is a Javascript component that can be used to enhance a textarea field in
HTML. It can be used on its own or as part of a larger WYSIWYG module such as
Scribite.

--------------------------------------------------------------------------------
Update Information:

Name: CVE-2010-1916  URL: http://cve.mitre.org/cgi-
bin/cvename.cgi?name=CVE-2010-1916  Assigned: 20100511  Reference: MISC:
http://www.php-security.org/2010/05/10/mops-2010-019-serendipity-wysiwyg-editor-
plugin-configuration-injection-vulnerability/index.html  Reference: MISC:
http://www.php-security.org/2010/05/10/mops-2010-020-xinha-wysiwyg-plugin-
configuration-injection-vulnerability/index.html    The dynamic configuration
feature in Xinha WYSIWYG editor 0.96 Beta 2  and earlier, as used in Serendipity
1.5.2 and earlier, allows remote  attackers to bypass intended access
restrictions and modify the  configuration of arbitrary plugins via (1) crafted
backend_config_secret_key_location and backend_config_hash parameters  that are
used in a SHA1 hash of a shared secret that can be known or  externally
influenced, which are not properly handled by the  "Deprecated config passing"
feature; or (2) crafted backend_data and  backend_data[key_location] variables,
which are not properly handled  by the xinha_read_passed_data function.  NOTE:
this can be leveraged to  upload and possibly execute arbitrary files via
config.inc.php in the  ImageManager plugin.
--------------------------------------------------------------------------------
ChangeLog:

--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #591701 - CVE-2010-1916 xinha: access restriction bypass [MOPS 2010-020]
        https://bugzilla.redhat.com/show_bug.cgi?id=591701
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update xinha' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list