[Git][security-tracker-team/security-tracker][master] mark two spip issues as non issues

Moritz Muehlenhoff (@jmm) jmm at debian.org
Thu Dec 26 18:44:56 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
5dbecaa9 by Moritz Muehlenhoff at 2024-12-26T19:42:54+01:00
mark two spip issues as non issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -6615,13 +6615,15 @@ CVE-2024-53975 (Accessing a non-secure HTTP site that uses a non-existent port m
 CVE-2024-53844 (E.D.D.I (Enhanced Dialog Driven Interface) is a middleware to connect  ...)
 	NOT-FOR-US: E.D.D.I (Enhanced Dialog Driven Interface)
 CVE-2024-53620 (A cross-site scripting (XSS) vulnerability in the Article module of SP ...)
-	- spip <unfixed> (bug #1088801)
-	[bookworm] - spip <postponed> (Minor issue, revisit when fixed upstream)
-	NOTE: https://grimthereaperteam.medium.com/ec1e8714c02e
+	NOTE: Non issue reported for spip, was also filed as #1088801
+	NOTE: Disputed by upstream: The code is not executed inside the back-office, but only
+	NOTE: on the public part, so only after being accepted by an admin. The script is
+	NOTE: displayed in its raw form inside the back office, so an admin can see it and
+	NOTE: decide to publish it or not.
 CVE-2024-53619 (An authenticated arbitrary file upload vulnerability in the Documents  ...)
-	- spip <unfixed> (bug #1088800)
-	[bookworm] - spip <postponed> (Minor issue, revisit when fixed upstream)
-	NOTE: https://grimthereaperteam.medium.com/spip-4-3-3-malicious-file-upload-xss-in-pdf-526c03bb1776
+	NOTE: Non issue reported for spip, was also filed as #1088800
+	NOTE: Disputed by upstream: The executed code is sandboxed with a limited scope and
+	NOTE: without access to the website context.
 CVE-2024-53555 (A CSV injection vulnerability in Taiga v6.8.1 allows attackers to exec ...)
 	NOT-FOR-US: Taiga
 CVE-2024-53365 (A stored cross-site scripting (XSS) vulnerability was identified in PH ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5dbecaa9abd828e3d6d9539fbc4b08b5c3b5f340

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5dbecaa9abd828e3d6d9539fbc4b08b5c3b5f340
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241226/9241f802/attachment.htm>


More information about the debian-security-tracker-commits mailing list