-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0877
                           dojo security update
                               12 March 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           dojo
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Overwrite Arbitrary Files -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-5259 CVE-2020-5258 

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2139

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running dojo check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : dojo
Version        : 1.10.2+dfsg-1+deb8u3
CVE ID         : CVE-2020-5258 CVE-2020-5259
Debian Bug     : 953585 953587


The following CVEs were reported against dojo:

CVE-2020-5258

    In affected versions of dojo, the deepCopy method is vulnerable
    to Prototype Pollution. An attacker could manipulate these
    attributes to overwrite, or pollute, a JavaScript application object
    prototype of the base object by injecting other values.

CVE-2020-5259

    The Dojox jQuery wrapper jqMix mixin method is vulnerable to
    Prototype Pollution. An attacker could manipulate these attributes
    to overwrite, or pollute, a JavaScript application object prototype
    of the base object by injecting other values.

For Debian 8 "Jessie", these problems have been fixed in version
1.10.2+dfsg-1+deb8u3.

We recommend that you upgrade your dojo packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Best,
Utkarsh
- -----BEGIN PGP SIGNATURE-----
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=p7M8
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXml6q2aOgq3Tt24GAQiUwBAAkNdSUfAatEyN2BvOCBr5Wd/aRmx85inl
+DKcHhXMkaPpgCNfkJPjuB4mzKsa7dp4vaOfWMhuNSsFCNWzwwHvVs/QZed/zRxr
QeUMaSHaQIBPslnpKN6nWupSr5JtECW6e+otk+3DB6+4BGXF5cWJNq9D2FdJLVuk
5/WJEdBZcSt6H/Sia3B1D6+A+mP3HELzhkwVGRdQcdWPUMDDvDwJaTfYVvlJzd41
rCuvFDCiSJdDgcIodbZoFZfnmroDsat6PZqX6EuNsTZ1Zfx1DCP5Hj5RYhAqz0nb
3Uu6SyIifcxCea5cJ0gNEGSSq1BGB1OeeD2o+IT/j58k7hzEkGfoxjPL+4h3oWdP
TYgZ5iE3l7ngD3q8SQzofrqwzhmpxdcxTUEW5LZZ+diVBiYME14rcWxmvrMDIkmQ
Sk/ccpbccZ2Q4rWPEtIg7K7reMOnf3XgphIQ3dbD3STr9Nq1JCJf67PhOIEo15Vr
+HOc9GgxgtoMuziMx361htu6rJQYHhwRDpfkDBszvFgsu258Sk0hruh4wUKRAoIZ
CyGIAeTC6AXL/UIg92AOeuzQ9jBAo+5JAj0Cgn73XY6V6Wfzxwa1fyc4VRiqUqME
a6ZjSlPHrp2BwomNLJLqdRMj3wycJkmNG1aQBXRt57YwLOKPajNSw5OnoOLECBqz
gppGEYc93dY=
=VbNJ
-----END PGP SIGNATURE-----