From delmonta@sodans.usata.org  Sun Sep 28 09:44:48 2003
Return-Path: <delmonta@sodans.usata.org>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id 76C3C16A4B3
	for <FreeBSD-gnats-submit@freebsd.org>; Sun, 28 Sep 2003 09:44:48 -0700 (PDT)
Received: from sodans.usata.org (sodans.usata.org [61.211.239.46])
	by mx1.FreeBSD.org (Postfix) with ESMTP id DA9FE44031
	for <FreeBSD-gnats-submit@freebsd.org>; Sun, 28 Sep 2003 09:44:47 -0700 (PDT)
	(envelope-from delmonta@sodans.usata.org)
Received: by sodans.usata.org (Postfix, from userid 1000)
	id F3C54A97F; Mon, 29 Sep 2003 01:44:46 +0900 (JST)
Message-Id: <20030928164446.F3C54A97F@sodans.usata.org>
Date: Mon, 29 Sep 2003 01:44:46 +0900 (JST)
From: IIJIMA Hiromitsu <delmonta@ht.sakura.ne.jp>
Reply-To: IIJIMA Hiromitsu <delmonta@ht.sakura.ne.jp>
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: CGI.pm in ports/japanese/perl5 has a cross-site scripting vulneravility
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         57322
>Category:       ports
>Synopsis:       CGI.pm in ports/japanese/perl5 has a cross-site scripting vulneravility
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sun Sep 28 09:50:02 PDT 2003
>Closed-Date:    Tue Sep 30 01:51:18 PDT 2003
>Last-Modified:  Tue Sep 30 01:51:18 PDT 2003
>Originator:     IIJIMA Hiromitsu
>Release:        FreeBSD 4.7-RELEASE-p3 i386
>Organization:
DENNOU GEDOU GAKKAI, N. D. D. http://www.dennougedougakkai-ndd.org
>Environment:
System: FreeBSD sodans.usata.org 4.7-RELEASE-p3 FreeBSD 4.7-RELEASE-p3 #0: Wed Jan 22 14:50:19 JST 2003 root@www.my.domain:/usr/src/sys/compile/RENTALv6 i386

Userland is upgraded to -p16, while the kernel is still -p3.

>Description:
	A cross-site scripting vulnerability is reported in CGI.pm.
	All of the following are affected:
		- 4.x base system's perl 5.005_03
		- ports/japanese/perl5 (5.005_03 with Japanese patch)
		- ports/lang/perl5 (5.6.1)
		- ports/lang/perl5.8 (5.8.0)

	I sent separate PR for 4.x base system and will send another
	for lang/perl5*.

>How-To-Repeat:
	See the exploit code at:
	http://marc.theaimsgroup.com/?l=bugtraq&m=105880349328877&w=2

>Fix:
	1. Currently, the only perfect solution is to replace CGI.pm with
	   a newer one.

	2. It is safe to avoid using CGI.pm's start_form() until ports/57302
	   is accepted.

	3. Just installing ports/www/p5-CGI.pm or latest version at CPAN does
	   not solve the problem, since jperl finds the old CGI.pm in standard
	   perl distribution, before searching site_perl folders where newer
	   CGI.pm is installed.
	   This problem will be solved if ports/57302 is accepted.

	4. If you do want to use start_form(), either
		- all local users are urged to make sure by themselves that
		  newer CGI.pm will be used, by using -I command-line option
		  or manipulating @INC array.
		- the administrator may ensure using newer CGI.pm by linking
		  newer one to the old one, namely,
			% su
			# cd /usr/local/lib/perl5/5.00503
			# ln -sf ../site_perl/5.005/CGI.pm .
>Release-Note:
>Audit-Trail:

From: IIJIMA Hiromitsu <delmonta@ht.sakura.ne.jp>
To: freebsd-gnats-submit@FreeBSD.org
Cc:  
Subject: Re: bin/57322: CGI.pm in ports/japanese/perl5 has a cross-site scripting 
 vulneravility
Date: Mon, 29 Sep 2003 01:51:05 +0900

 Labelled as CAN-2003-0615 and more information is available at:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0615

From: IIJIMA Hiromitsu <delmonta@ht.sakura.ne.jp>
To: freebsd-gnats-submit@FreeBSD.org
Cc:  
Subject: Re: bin/57322: CGI.pm in ports/japanese/perl5 has a cross-site scripting 
 vulneravility
Date: Mon, 29 Sep 2003 01:53:07 +0900

 [RESENDING BECAUSE I'VE SENT A FOLLOWUP WITH CHARSET=ISO-2022-JP]
 Labelled as CAN-2003-0615 and more information is available at:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0615

From: IIJIMA Hiromitsu <delmonta@ht.sakura.ne.jp>
To: freebsd-gnats-submit@FreeBSD.org
Cc:  
Subject: Re: bin/57322: CGI.pm in ports/japanese/perl5 has a cross-site scripting 
 vulneravility
Date: Mon, 29 Sep 2003 01:59:49 +0900

 Sorry, I have posted with wrong Category labelling.
 It should have been labelled as ports/57322.
 
 It is my fault that I failed to change Category: line after
 copy-and-paste'ing from bin/57321.

From: IIJIMA Hiromitsu <delmonta@ht.sakura.ne.jp>
To: freebsd-gnats-submit@FreeBSD.org
Cc:  
Subject: Re: ports/57322: CGI.pm in ports/japanese/perl5 has a cross-site 
 scripting vulneravility
Date: Tue, 30 Sep 2003 15:23:45 +0900

 I have reposted the duplicate as ports/57390 before noticing that this issue
 was renumbered to ports/57322.
 
 Ports/57390 was already passed to the maintainer, so solve one of the two,
 and close another.
State-Changed-From-To: open->closed 
State-Changed-By: nork 
State-Changed-When: Tue Sep 30 01:50:59 PDT 2003 
State-Changed-Why:  
Superseded by ports/57390. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=57322 
>Unformatted:
