OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall
Root: /e/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-src openpkg-web Date: 21-Oct-2003 11:12:49
Branch: OPENPKG_1_3_SOLID HEAD Handle: 2003102110124702
Modified files:
openpkg-web news.txt
Modified files: (Branch: OPENPKG_1_3_SOLID)
openpkg-src/perl-www perl-www.patch perl-www.spec
Log:
fix CGI.pm form URL generation by backporting more correct security
fix from CGI.pm 3.00
Summary:
Revision Changes Path
1.1.2.1.2.2 +9 -6 openpkg-src/perl-www/perl-www.patch
1.45.2.5.2.3+2 -2 openpkg-src/perl-www/perl-www.spec
1.7092 +1 -0 openpkg-web/news.txt
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-src/perl-www/perl-www.patch
============================================================================
$ cvs diff -u -r1.1.2.1.2.1 -r1.1.2.1.2.2 perl-www.patch
--- openpkg-src/perl-www/perl-www.patch 6 Aug 2003 15:07:14 -0000
1.1.2.1.2.1
+++ openpkg-src/perl-www/perl-www.patch 21 Oct 2003 09:12:49 -0000
1.1.2.1.2.2
@@ -1,25 +1,28 @@
http://stein.cshl.org/WWW/software/CGI/
under "Revision History" find "Fixed cross-site scripting bug
reported by obscure" note attached to Version 2.94. A quick fix was
- introduced in 2.94. It was replaced by a more careful patch in 2.99.
+ introduced in 2.94. It was replaced by a more careful patch in 3.00.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0615
Cross-site scripting (XSS) vulnerability in start_form() of CGI.pm
allows remote attackers to insert web script via a URL that is fed
into the form's action parameter
---- CGI.pm-2.98/CGI.pm.orig Wed Jun 18 21:57:21 2003
-+++ CGI.pm-2.98/CGI.pm Fri Aug 1 16:39:52 2003
-@@ -1641,10 +1641,10 @@
+Index: CGI.pm-2.98/CGI.pm
+--- CGI.pm-2.98/CGI.pm.orig 2003-06-18 21:57:21.000000000 +0200
++++ CGI.pm-2.98/CGI.pm 2003-10-21 11:10:30.000000000 +0200
+@@ -1639,12 +1639,11 @@
+ $method = lc($method) || 'post';
+ $enctype = $enctype || &URL_ENCODED;
unless (defined $action) {
- $action = $self->url(-absolute=>1,-path=>1);
+- $action = $self->url(-absolute=>1,-path=>1);
++ $action = $self->escapeHTML($self->url(-absolute=>1,-path=>1));
if (length($ENV{QUERY_STRING})>0) {
- $action .= "?$ENV{QUERY_STRING}";
+ $action .= "?".$self->escapeHTML($ENV{QUERY_STRING},1);
}
}
- $action =~ s/\"/%22/g; # fix cross-site scripting bug reported by obscure
-+ $action = escape($action);
$action = qq(action="$action");
my($other) = @other ? " @other" : '';
$self->{'.parametersToAdd'}={};
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/perl-www/perl-www.spec
============================================================================
$ cvs diff -u -r1.45.2.5.2.2 -r1.45.2.5.2.3 perl-www.spec
--- openpkg-src/perl-www/perl-www.spec 6 Aug 2003 15:07:14 -0000
1.45.2.5.2.2
+++ openpkg-src/perl-www/perl-www.spec 21 Oct 2003 09:12:49 -0000
1.45.2.5.2.3
@@ -48,8 +48,8 @@
Distribution: OpenPKG [BASE]
Group: Language
License: GPL/Artistic
-Version: 1.3.1
-Release: 1.3.1
+Version: 1.3.2
+Release: 1.3.2
# list of sources
Source0: http://www.cpan.org/modules/by-module/URI/URI-%{V_uri}.tar.gz
@@ .
patch -p0 <<'@@ .'
Index: openpkg-web/news.txt
============================================================================
$ cvs diff -u -r1.7091 -r1.7092 news.txt
--- openpkg-web/news.txt 21 Oct 2003 09:06:48 -0000 1.7091
+++ openpkg-web/news.txt 21 Oct 2003 09:12:47 -0000 1.7092
@@ -1,3 +1,4 @@
+21-Oct-2003: Upgraded package: P<perl-www-1.3.2-1.3.2>
21-Oct-2003: Upgraded package: P<perl-5.8.0-1.2.2>
21-Oct-2003: Upgraded package: P<coreutils-5.0.1-1.3.1>
21-Oct-2003: Upgraded package: P<perl-5.8.0-1.3.2>
@@ .
______________________________________________________________________
The OpenPKG Project www.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]