Package: usemod-wiki Version: 1.0-6 Severity: grave Justification: XSS vulnerability Tags: sarge sid pending patch
Thanks to Djoume SALVETTI for making me aware of this: > From CAN-2004-1397 : > > | Cross-site scripting (XSS) vulnerability in UseModWiki 1.0 allows > | remote attackers to inject arbitrary web script or HTML via an > | argument to wiki.pl. > > A "exploit" is also available here : > > http://www.securityfocus.com/bid/11924/exploit/ The following patch fixes this, upload due soon. --- wiki.pl.org 2005-02-16 12:57:20.000000000 +0100 +++ wiki.pl 2005-02-16 13:08:59.000000000 +0100 @@ -378,6 +378,9 @@ sub Ts { my ($text, $string) = @_; + $string =~ s/&/&/g; + $string =~ s/</</g; + $string =~ s/>/>/g; $text = T($text); $text =~ s/\%s/$string/; return $text; Christoph -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (700, 'testing'), (600, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.4.25-planck Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Versions of packages usemod-wiki depends on: ii apache [httpd] 1.3.33-3 versatile, high-performance HTTP s ii apache-ssl [httpd] 1.3.33-3 versatile, high-performance HTTP s ii apache2-mpm-prefork [httpd] 2.0.52-3 Traditional model for Apache2 ii perl [perl5] 5.8.4-6 Larry Wall's Practical Extraction -- no debconf information -- [EMAIL PROTECTED] | http://www.df7cb.de/
signature.asc
Description: Digital signature