X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/9ff1edb5b986be7fded254127c1e4893c036ec3c..883880b46ddc0d650f70bd6ca2a22539ff78f1b6:/doc/security.mdwn?ds=inline diff --git a/doc/security.mdwn b/doc/security.mdwn index c3b62cd3c..d5a0266cd 100644 --- a/doc/security.mdwn +++ b/doc/security.mdwn @@ -110,7 +110,7 @@ runs ikiwiki to update a given wiki. The wrapper can in turn be made suid, for example to be used in a [[post-commit]] hook by people who cannot write to the html pages, etc. -If the wrapper script is made suid, then any bugs in this wrapper would be +If the wrapper program is made suid, then any bugs in this wrapper would be security holes. The wrapper is written as securely as I know how, is based on code that has a history of security use long before ikiwiki, and there's been no problem yet. @@ -497,3 +497,12 @@ Raúl Benencia discovered an additional XSS exposure in the meta plugin. This hole was discovered on 16 May 2012 and fixed the same day with the release of ikiwiki 3.20120516. A fix was backported to Debian squeeze, as version 3.20100815.9. An upgrade is recommended for all sites. + +## XSS via openid selector + +Raghav Bisht discovered this XSS in the openid selector. ([[!cve CVE-2015-2793]]) + +The hole was reported on March 24th, a fix was developed on March 27th, +and the fixed version 3.20150329 was released on the 29th. A fix was backported +to Debian jessie as version 3.20141016.2 and to Debian wheezy as version +3.20120629.2. An upgrade is recommended for sites using CGI and openid.