XSS attack vector in Zend_Filter_StripTags

Bug #345682 reported by Micah Gersten
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
zend-framework (Ubuntu)
Fix Released
Undecided
Stephan Rügamer
Hardy
Fix Released
Undecided
Stephan Rügamer
Intrepid
Fix Released
Undecided
Stephan Rügamer
Jaunty
Fix Released
Undecided
Stephan Rügamer
Karmic
Fix Released
Undecided
Stephan Rügamer

Bug Description

Binary package hint: zend-framework

From Zend PHP FW Mailing List:
The Zend Framework team was recently notified of an XSS attack vector in its Zend_Filter_StripTags class. Zend_Filter_StripTags offers the ability to strip HTML tags from text, but also to selectively choose which tags and specific attributes of those tags to keep.

The XSS attack vector was due to a bug in matching HTML tag attributes to retain. If whitespace was introduced surrounding the attribute assignment operator or the value included newline characters, the attribute would always be included in the final output- even if it was not marked to retain.

A security fix has been created and released with Zend Framework 1.7.7.

Additionally, the fix has been back-ported to the 1.6, 1.5, and 1.0 release branches.

The Zend Framework team strongly recommends upgrading to version 1.7.7. If you cannot upgrade at this time, we recommend exporting from the release branch matching the minor release you are currently using, or downloading the file listed below and pushing it into your Zend Framework installation.

    http://framework.zend.com/svn/framework/standard/branches/release-1.7/library/Zend/Filter/StripTags.php

Thank you.

,Wil

visibility: private → public
Revision history for this message
Kees Cook (kees) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityUpdateProcedures

Changed in zend-framework (Ubuntu):
status: New → Confirmed
Revision history for this message
Micah Gersten (micahg) wrote : Re: [Bug 345682] Re: XSS attack vector in Zend_Filter_StripTags

Kees Cook wrote:
> Thanks for taking the time to report this bug and helping to make Ubuntu
> better. Since the package referred to in this bug is in universe or
> multiverse, it is community maintained. If you are able, I suggest
> posting a debdiff for this issue. When a debdiff is available, members
> of the security team will review it and publish the package. See the
> following link for more information:
> https://wiki.ubuntu.com/SecurityUpdateProcedures
>
> ** Changed in: zend-framework (Ubuntu)
> Status: New => Confirmed
>
>
Am I allowed to just patch this one bug or can I upgrade the package to
the lastest version as well?

Thanks,
Micah

Revision history for this message
Stephan Rügamer (sruegamer) wrote :

I'll create some security bugfix packages ...

Changed in zend-framework (Ubuntu Jaunty):
assignee: nobody → Stephan Hermann (shermann)
status: New → Confirmed
Changed in zend-framework (Ubuntu Intrepid):
assignee: nobody → Stephan Hermann (shermann)
status: New → Confirmed
Changed in zend-framework (Ubuntu Hardy):
assignee: nobody → Stephan Hermann (shermann)
status: New → Confirmed
Changed in zend-framework (Ubuntu):
assignee: nobody → Stephan Hermann (shermann)
Revision history for this message
Stephan Rügamer (sruegamer) wrote :
Revision history for this message
Stephan Rügamer (sruegamer) wrote :
Revision history for this message
Stephan Rügamer (sruegamer) wrote :
Changed in zend-framework (Ubuntu Hardy):
status: Confirmed → In Progress
Changed in zend-framework (Ubuntu Intrepid):
status: Confirmed → In Progress
Changed in zend-framework (Ubuntu Jaunty):
status: Confirmed → In Progress
Kees Cook (kees)
Changed in zend-framework (Ubuntu Karmic):
status: Confirmed → Fix Released
Revision history for this message
Kees Cook (kees) wrote :

I've also added patch tags to the patch, as detailed here: https://wiki.ubuntu.com/UbuntuDevelopment/PatchTaggingGuidelines

Changed in zend-framework (Ubuntu Hardy):
status: In Progress → Fix Committed
Changed in zend-framework (Ubuntu Intrepid):
status: In Progress → Fix Committed
Revision history for this message
Kees Cook (kees) wrote :

Everything is building in the security queue now. It should be published shortly. Thanks!

Changed in zend-framework (Ubuntu Jaunty):
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package zend-framework - 1.5.1-0ubuntu1.1

---------------
zend-framework (1.5.1-0ubuntu1.1) hardy-security; urgency=low

  * SECURITY UPDATE: (LP: #345682)
    Announcement: http://www.nabble.com/SECURITY-ADVISORY-tp22609193p22609193.html
    From Zend PHP FW Mailing List:
    The Zend Framework team was recently notified of an XSS attack vector in its Zend_Filter_StripTags class.
    Zend_Filter_StripTags offers the ability to strip HTML tags from text, but also to selectively choose
    which tags and specific attributes of those tags to keep.
    The XSS attack vector was due to a bug in matching HTML tag attributes to retain.
    If whitespace was introduced surrounding the attribute assignment operator or the value included newline characters,
    the attribute would always be included in the final output- even if it was not marked to retain.
    A security fix has been created and released with Zend Framework 1.7.7.
    Additionally, the fix has been back-ported to the 1.6, 1.5, and 1.0 release branches.
  * debian/patches/zf_Zend_Filter_security_fix.patch:
    Fixes security issue according to
    http://framework.zend.com/svn/framework/standard/branches/release-1.7/library/Zend/Filter/StripTags.php
  * debian/control: added quilt as build dependency
  * debian/rules: include quilt.mk and call patch/unpatch targets

 -- Stephan Hermann <email address hidden> Thu, 14 May 2009 12:39:55 +0000

Changed in zend-framework (Ubuntu Hardy):
status: Fix Committed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package zend-framework - 1.5.3-0ubuntu2.1

---------------
zend-framework (1.5.3-0ubuntu2.1) intrepid-security; urgency=low

  * SECURITY UPDATE: (LP: #345682)
    Announcement: http://www.nabble.com/SECURITY-ADVISORY-tp22609193p22609193.html
    From Zend PHP FW Mailing List:
    The Zend Framework team was recently notified of an XSS attack vector in its Zend_Filter_StripTags class.
    Zend_Filter_StripTags offers the ability to strip HTML tags from text, but also to selectively choose
    which tags and specific attributes of those tags to keep.
    The XSS attack vector was due to a bug in matching HTML tag attributes to retain.
    If whitespace was introduced surrounding the attribute assignment operator or the value included newline characters,
    the attribute would always be included in the final output- even if it was not marked to retain.
    A security fix has been created and released with Zend Framework 1.7.7.
    Additionally, the fix has been back-ported to the 1.6, 1.5, and 1.0 release branches.
  * debian/patches/zf_Zend_Filter_security_fix.patch:
    Fixes security issue according to
    http://framework.zend.com/svn/framework/standard/branches/release-1.7/library/Zend/Filter/StripTags.php

 -- Stephan Hermann <email address hidden> Thu, 14 May 2009 12:31:49 +0000

Changed in zend-framework (Ubuntu Intrepid):
status: Fix Committed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package zend-framework - 1.7.5-0ubuntu2.1

---------------
zend-framework (1.7.5-0ubuntu2.1) jaunty-security; urgency=low

  * SECURITY UPDATE: (LP: #345682)
    Announcement: http://www.nabble.com/SECURITY-ADVISORY-tp22609193p22609193.html
    From Zend PHP FW Mailing List:
    The Zend Framework team was recently notified of an XSS attack vector in its Zend_Filter_StripTags class.
    Zend_Filter_StripTags offers the ability to strip HTML tags from text, but also to selectively choose
    which tags and specific attributes of those tags to keep.
    The XSS attack vector was due to a bug in matching HTML tag attributes to retain.
    If whitespace was introduced surrounding the attribute assignment operator or the value included newline characters,
    the attribute would always be included in the final output- even if it was not marked to retain.
    A security fix has been created and released with Zend Framework 1.7.7.
    Additionally, the fix has been back-ported to the 1.6, 1.5, and 1.0 release branches.
  * debian/patches/zf_Zend_Filter_security_fix.patch:
    Fixes security issue according to
    http://framework.zend.com/svn/framework/standard/branches/release-1.7/library/Zend/Filter/StripTags.php

 -- Stephan Hermann <email address hidden> Thu, 14 May 2009 12:13:41 +0000

Changed in zend-framework (Ubuntu Jaunty):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.