Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-4556: fix(security): Security fix for WSTG-INPV-02. Add XSS protection on i… · Alinto/sogo@efac49a

A vulnerability was found in Alinto SOGo up to 5.7.1 and classified as problematic. Affected by this issue is the function _migrateMailIdentities of the file SoObjects/SOGo/SOGoUserDefaults.m of the component Identity Handler. The manipulation of the argument fullName leads to cross site scripting. The attack may be launched remotely. Upgrading to version 5.8.0 is able to address this issue. The name of the patch is efac49ae91a4a325df9931e78e543f707a0f8e5e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215960.

CVE
#xss#vulnerability

@@ -147,7 +147,7 @@ - (BOOL) _migrateMailIdentities rc = NO;
if ([fullName length]) [identity setObject: fullName forKey: @"fullName"]; [identity setObject: [fullName stringWithoutHTMLInjection: YES] forKey: @"fullName"]; if ([email length]) [identity setObject: email forKey: @"email"]; if ([replyTo length]) @@ -797,7 +797,21 @@ - (void) setMailIdentities: (NSArray *) newIdentites
- (NSArray *) mailIdentities { return [self arrayForKey: @"SOGoMailIdentities"]; NSMutableArray *mailIdentities; NSMutableDictionary *mailIdentity; NSUInteger i;
// Remove possible XSS injection mailIdentities = [NSMutableArray arrayWithArray: [self arrayForKey: @"SOGoMailIdentities"]]; for (i = 0 ; i < [mailIdentities length] ; i++) { mailIdentity = [mailIdentities objectAtIndex: i]; if ([mailIdentity objectForKey: @"fullName"]) { [mailIdentity setObject: [[mailIdentity objectForKey: @"fullName"] stringWithoutHTMLInjection: YES] forKey: @"fullName"]; [mailIdentities setObject: mailIdentity atIndexedSubscript: i]; } }
return mailIdentities; }
- (void) setMailForceDefaultIdentity: (BOOL) newValue

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda