Vulnerabilities > CVE-2008-1474 - Unspecified vulnerability in Roundup-Tracker Roundup
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN roundup-tracker
nessus
Summary
Multiple unspecified vulnerabilities in Roundup before 1.4.4 have unknown impact and attack vectors, some of which may be related to cross-site scripting (XSS).
Vulnerable Configurations
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200805-21.NASL description The remote host is affected by the vulnerability described in GLSA-200805-21 (Roundup: Permission bypass) Philipp Gortan reported that the xml-rpc server in Roundup does not check property permissions (CVE-2008-1475). Furthermore, Roland Meister discovered multiple vulnerabilities caused by unspecified errors, some of which may be related to cross-site scripting (CVE-2008-1474). Impact : A remote attacker could possibly exploit the first vulnerability to edit or view restricted properties via the list(), display(), and set() methods. The impact and attack vectors of the second vulnerability are unknown. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 32450 published 2008-05-28 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/32450 title GLSA-200805-21 : Roundup: Permission bypass NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1554.NASL description Roundup, an issue tracking system, fails to properly escape HTML input, allowing an attacker to inject client-side code (typically JavaScript) into a document that may be viewed in the victim last seen 2020-06-01 modified 2020-06-02 plugin id 32034 published 2008-04-25 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/32034 title Debian DSA-1554-2 : roundup - insufficient input sanitising NASL family Fedora Local Security Checks NASL id FEDORA_2008-2471.NASL description - Fri Mar 7 2008 Paul P. Komkoff Jr <i at stingr.net> - 1.4.4-1 - new upstream version with security fixes (bz#436546) - Wed Feb 20 2008 Paul P. Komkoff Jr <i at stingr.net> - 1.4.1-2 - new upstream version - Wed Jan 23 2008 Paul P. Komkoff Jr <i at stingr.net> - 1.4.1-1 - new upstream version Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 31435 published 2008-03-13 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/31435 title Fedora 8 : roundup-1.4.4-1.fc8 (2008-2471) NASL family Fedora Local Security Checks NASL id FEDORA_2008-2370.NASL description - Bug #436546 - Roundup 1.4.4 contains some sekrit security fixes Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 31430 published 2008-03-13 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/31430 title Fedora 7 : roundup-1.4.4-1.fc7 (2008-2370)
References
- http://roundup.cvs.sourceforge.net/roundup/roundup/CHANGES.txt?revision=1.939&view=markup
- http://roundup.cvs.sourceforge.net/roundup/roundup/CHANGES.txt?revision=1.939&view=markup
- http://secunia.com/advisories/29336
- http://secunia.com/advisories/29336
- http://secunia.com/advisories/29375
- http://secunia.com/advisories/29375
- http://secunia.com/advisories/29848
- http://secunia.com/advisories/29848
- http://secunia.com/advisories/30274
- http://secunia.com/advisories/30274
- http://security.gentoo.org/glsa/glsa-200805-21.xml
- http://security.gentoo.org/glsa/glsa-200805-21.xml
- http://www.debian.org/security/2008/dsa-1554
- http://www.debian.org/security/2008/dsa-1554
- http://www.securityfocus.com/bid/28239
- http://www.securityfocus.com/bid/28239
- http://www.vupen.com/english/advisories/2008/0891
- http://www.vupen.com/english/advisories/2008/0891
- https://bugzilla.redhat.com/show_bug.cgi?id=436546
- https://bugzilla.redhat.com/show_bug.cgi?id=436546
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41241
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41241
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html