Return-Path: X-Original-To: apmail-archiva-dev-archive@www.apache.org Delivered-To: apmail-archiva-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 0152A48AC for ; Fri, 27 May 2011 12:24:40 +0000 (UTC) Received: (qmail 17576 invoked by uid 500); 27 May 2011 12:24:39 -0000 Delivered-To: apmail-archiva-dev-archive@archiva.apache.org Received: (qmail 17496 invoked by uid 500); 27 May 2011 12:24:39 -0000 Mailing-List: contact dev-help@archiva.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@archiva.apache.org Delivered-To: mailing list dev@archiva.apache.org Received: (qmail 17481 invoked by uid 99); 27 May 2011 12:24:39 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 27 May 2011 12:24:39 +0000 X-ASF-Spam-Status: No, hits=1.5 required=5.0 tests=FREEMAIL_FROM,HTML_MESSAGE,RCVD_IN_DNSWL_LOW,RFC_ABUSE_POST,SPF_PASS,T_TO_NO_BRKTS_FREEMAIL X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of odeaching@gmail.com designates 209.85.161.42 as permitted sender) Received: from [209.85.161.42] (HELO mail-fx0-f42.google.com) (209.85.161.42) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 27 May 2011 12:24:32 +0000 Received: by fxm1 with SMTP id 1so1548672fxm.15 for ; Fri, 27 May 2011 05:24:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:date:x-google-sender-auth :message-id:subject:from:to:content-type; bh=qu0qcfQkpd9dbA5M/DwjEhAp2L3iCmcKE5LcifkoXlA=; b=KAwsg4IP0r51SHaH00J+tkAH42SewUdhjSBfuFzBgE9NjUP97Ne2ZosQK51YldOSHF c9kXg/iaFjAtSzWAimFbS2BYY5FXjOf5zVHQ6QV3YCMkGFvMiXUOX0MLXs6tkIWUKXsv davI/iGXWLNPImQR1xcmBvA+BQmGaghN3lewc= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:date:x-google-sender-auth:message-id:subject :from:to:content-type; b=KASlPWP5rBdxVoafN9qoNNRr+j9EwzfZK9XfYTxwz8zbYYLCUS3zhL8oTX6QA6A/Wp n1kW7Cv8OvjlziWpQ3tzU2UDc5OKI7aeNcmJAZQkQdWODnCrX5oJj8lVLvELbwFwYdfo rkLJGE0ohYVssMvfviyHRvRIvi5i0GOTDA3f0= MIME-Version: 1.0 Received: by 10.223.143.20 with SMTP id s20mr2264317fau.10.1306499051333; Fri, 27 May 2011 05:24:11 -0700 (PDT) Sender: odeaching@gmail.com Received: by 10.223.123.212 with HTTP; Fri, 27 May 2011 05:24:11 -0700 (PDT) Date: Fri, 27 May 2011 20:24:11 +0800 X-Google-Sender-Auth: NSO_QQHSCKyozU9C7u_FQgvv_3Q Message-ID: Subject: [SECURITY] CVE-2011-1077: Apache Archiva Multiple XSS vulnerability From: Deng Ching To: announce@apache.org, bugtraq@securityfocus.com, security@apache.org, full-disclosure@lists.grok.org.uk, users@archiva.apache.org, dev@archiva.apache.org Content-Type: multipart/alternative; boundary=0023545bd3ecdaa88604a4410321 --0023545bd3ecdaa88604a4410321 Content-Type: text/plain; charset=ISO-8859-1 CVE-2011-1077: Apache Archiva Multiple XSS vulnerability Severity: High Vendor: The Apache Software Foundation Versions Affected: Archiva 1.3.0 - 1.3.4 The unsupported versions Archiva 1.0 - 1.2.2 are also affected. Description: The multiple XSS issues found are both Stored (Persistent) and Reflected (Non-Persistent). Javascript which might contain malicious code can be appended in a request parameter or stored as a value in a submitted form, and get executed. Mitigation: Archiva 1.3.4 and earlier users should upgrade to 1.3.5 Credit: This issue was discovered by Riyaz Ahemed Walikar of Microland Ltd., India References: http://archiva.apache.org/security.html Thanks, The Apache Archiva Team --0023545bd3ecdaa88604a4410321--