Package: usemod-wiki
Version: 1.0-6
Severity: grave
Justification: XSS vulnerability
Tags: sarge sid pending patch

Thanks to Djoume SALVETTI for making me aware of this:

> From  CAN-2004-1397 :
> 
> | Cross-site scripting (XSS) vulnerability in UseModWiki 1.0 allows
> | remote attackers to inject arbitrary web script or HTML via an
> | argument to wiki.pl.
> 
> A "exploit" is also available here :
> 
> http://www.securityfocus.com/bid/11924/exploit/

The following patch fixes this, upload due soon.

--- wiki.pl.org 2005-02-16 12:57:20.000000000 +0100
+++ wiki.pl     2005-02-16 13:08:59.000000000 +0100
@@ -378,6 +378,9 @@
 sub Ts {
   my ($text, $string) = @_;
 
+  $string =~ s/&/&/g;
+  $string =~ s/</&lt;/g;
+  $string =~ s/>/&gt;/g;
   $text = T($text);
   $text =~ s/\%s/$string/;
   return $text;


Christoph


-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (700, 'testing'), (600, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.25-planck
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)

Versions of packages usemod-wiki depends on:
ii  apache [httpd]                1.3.33-3   versatile, high-performance HTTP s
ii  apache-ssl [httpd]            1.3.33-3   versatile, high-performance HTTP s
ii  apache2-mpm-prefork [httpd]   2.0.52-3   Traditional model for Apache2
ii  perl [perl5]                  5.8.4-6    Larry Wall's Practical Extraction 

-- no debconf information

-- 
[EMAIL PROTECTED] | http://www.df7cb.de/

Attachment: signature.asc
Description: Digital signature

Reply via email to