Hi,
I intend to NMU this bug.
The attached patch fixes this issue.
It will be also archived on:
http://people.debian.org/~nion/nmu-diff/gnatsweb_4.00-1_4.00-1.1.patch

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u gnatsweb-4.00/debian/changelog gnatsweb-4.00/debian/changelog
--- gnatsweb-4.00/debian/changelog
+++ gnatsweb-4.00/debian/changelog
@@ -1,3 +1,12 @@
+gnatsweb (4.00-1.1) unstable; urgency=high
+
+  * Non-maintainer upload by testing security team.
+  * Fixed missing escaping of the database parameter which leads
+    to a cross-site scripting vulnerability (XSS) via this
+    parameter (CVE-2007-2808) (Closes: # 427156).
+
+ -- Nico Golde <[EMAIL PROTECTED]>  Sat, 06 Oct 2007 15:03:47 +0200
+
 gnatsweb (4.00-1) unstable; urgency=low
 
   * New upstream release.
only in patch2:
unchanged:
--- gnatsweb-4.00.orig/gnatsweb.pl
+++ gnatsweb-4.00/gnatsweb.pl
@@ -1312,6 +1312,7 @@
 {
   my($cmd, $pr, $include_return_url) = @_;
   my $url = $q->url() . "?cmd=$cmd&database=$global_prefs{'database'}";
+  $global_prefs{'database'}=$q->escapeHTML($global_prefs{'database'});
   $url .= "&pr=$pr" if $pr;
   $url .= "&return_url=" . $q->escape($q->self_url())
         if $include_return_url;

Attachment: pgpREFCCZ6c48.pgp
Description: PGP signature

Reply via email to