Hi, I intend to NMU this bug. The attached patch fixes this issue. It will be also archived on: http://people.debian.org/~nion/nmu-diff/gnatsweb_4.00-1_4.00-1.1.patch
Kind regards Nico -- Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
diff -u gnatsweb-4.00/debian/changelog gnatsweb-4.00/debian/changelog --- gnatsweb-4.00/debian/changelog +++ gnatsweb-4.00/debian/changelog @@ -1,3 +1,12 @@ +gnatsweb (4.00-1.1) unstable; urgency=high + + * Non-maintainer upload by testing security team. + * Fixed missing escaping of the database parameter which leads + to a cross-site scripting vulnerability (XSS) via this + parameter (CVE-2007-2808) (Closes: # 427156). + + -- Nico Golde <[EMAIL PROTECTED]> Sat, 06 Oct 2007 15:03:47 +0200 + gnatsweb (4.00-1) unstable; urgency=low * New upstream release. only in patch2: unchanged: --- gnatsweb-4.00.orig/gnatsweb.pl +++ gnatsweb-4.00/gnatsweb.pl @@ -1312,6 +1312,7 @@ { my($cmd, $pr, $include_return_url) = @_; my $url = $q->url() . "?cmd=$cmd&database=$global_prefs{'database'}"; + $global_prefs{'database'}=$q->escapeHTML($global_prefs{'database'}); $url .= "&pr=$pr" if $pr; $url .= "&return_url=" . $q->escape($q->self_url()) if $include_return_url;
pgpREFCCZ6c48.pgp
Description: PGP signature