CVE-2009-0660 Multiple XSS vulnerabilities in Mahara 1.0.9

Bug #340863 reported by François Marier
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
mahara (Ubuntu)
Fix Released
Undecided
Unassigned
Intrepid
Invalid
Undecided
Unassigned
Jaunty
Fix Released
Undecided
Unassigned

Bug Description

Binary package hint: mahara

The latest version of Mahara 1.0.x (1.0.10) fixes a number of XSS bugs in user profile data and blogs.

This is the official Mahara security advisory: http://mahara.org/interaction/forum/topic.php?id=350

The CVE issue itself doesn't appear to be public yet, but I have attached the patch I sent over to vendor-sec.

Given that Mahara 1.0.10 doesn't bring new features, only bug fixes, I would recommend that Ubuntu simply upgrade to that version for Jaunty. Otherwise I can prepare a patched 1.0.9-1+ubuntu1 package.

CVE References

Revision history for this message
François Marier (fmarier) wrote :
Changed in mahara:
status: New → Confirmed
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thank you for using Ubuntu and taking the time to report a bug. Marking as public since upstream has a fix out. We are currently in FeatureFreeze so a patch to the existing package in Jaunty is needed.

Changed in mahara:
status: New → Confirmed
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Also, as this package is in universe and is community supported, perhaps you could prepare a debdiff for Intrepid to fix this by following https://wiki.ubuntu.com/SecurityUpdateProcedures. Thanks!

Revision history for this message
François Marier (fmarier) wrote :

I understand that there is a feature freeze, but is a freeze exception needed even if the new upstream version doesn't introduce new features?

Mahara 1.0.x is currently the old stable version and so it only gets bug fixes (see the release notes at http://mahara.org/interaction/forum/topic.php?id=351).

Upgrading the Jaunty version now would fix a few bugs and would make it easier to apply future fixes if needed.

Since Jaunty is not released yet, I assumed that we didn't have to follow the regular security procedure and that we could just update to the latest upstream point release.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Since this package will require new packaging of the upstream source (as opposed to a simple sync request from Debian (sid and testing have 1.1 now)), it does require an FFE and the corresponding review. Once reviewed, it can be uploaded to Jaunty. See https://wiki.ubuntu.com/FreezeExceptionProcess for details.

As always, a patch/debdiff which follows https://wiki.ubuntu.com/SecurityUpdateProcedures is another option, and likely easier to get into Jaunty at this point in our release cycle.

Revision history for this message
François Marier (fmarier) wrote :

Here's a patched 1.0.9-2 package which I have built and tested.

It is based on the upstream 1.0 patch that was sent to vendor-sec.

Changed in mahara:
status: Confirmed → Fix Committed
Revision history for this message
François Marier (fmarier) wrote :

No point in fixing intrepid as that version of the package is completely unusable.

Changed in mahara:
status: Confirmed → Invalid
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

If Intrepid is unusable another bug should be filed against it detailing the problems, with the fixes (if you know them). A StableReleaseUpdate (SRU) could then be applied for that makes it usable again (and also fixing this security issue).

Changed in mahara:
status: Invalid → New
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package mahara - 1.0.9-2ubuntu0.2

---------------
mahara (1.0.9-2ubuntu0.2) jaunty; urgency=low

  * Upload to correct pocket

mahara (1.0.9-2ubuntu0.1) jaunty-security; urgency=low

  * SECURITY UPDATE: multiple cross-site scripting vulnerabilities in user
    profile data and blogs (LP: #340863)
    - debian/patches/CVE-2009-0660.dpatch: fixes from upstream advisory
    - http://mahara.org/interaction/forum/topic.php?id=350
    - CVE-2009-0660
  * Add dpatch support

 -- Jamie Strandboge <email address hidden> Thu, 19 Mar 2009 10:04:50 -0500

Changed in mahara:
status: Fix Committed → Fix Released
Revision history for this message
Alex Valavanis (valavanisalex) wrote :

Intrepid Ibex reached end-of-life on 30 April 2010 so I am closing the
report. The bug has been fixed in newer releases of Ubuntu.

Changed in mahara (Ubuntu Intrepid):
status: New → Invalid
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.