From klieber@gentoo.org Thu Sep 16 22:14:31 2004 From: Kurt Lieber To: gentoo-announce@lists.gentoo.org Cc: bugtraq@securityfocus.com, full-disclosure@lists.netsys.com, security-alerts@linuxsecurity.com Date: Thu, 16 Sep 2004 21:58:37 +0000 Subject: [Full-Disclosure] [ GLSA 200409-22 ] phpGroupWare: XSS vulnerability in wiki module - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200409-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: phpGroupWare: XSS vulnerability in wiki module Date: September 16, 2004 Bugs: #63063 ID: 200409-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== The phpGroupWare software contains a cross site scripting vulnerability in the wiki module. Background ========== phpGroupWare is a web-based suite of group applications including calendar, todo-list, addressbook, email, wiki, news headlines, and a file manager. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-apps/phpgroupware < 0.9.16.003 >= 0.9.16.003 Description =========== Due to an input validation error, the wiki module in the phpGroupWare suite is vulnerable to cross site scripting attacks. Impact ====== This vulnerability gives an attacker the ability to inject and execute malicious script code, potentially compromising the victim's browser. Workaround ========== The is no known workaround at this time. Resolution ========== All phpGroupWare users should upgrade to the latest version: # emerge sync # emerge -pv ">=www-apps/phpgroupware-0.9.16.003" # emerge ">=www-apps/phpgroupware-0.9.16.003" References ========== [ 1 ] phpGroupWare ChangeLog http://downloads.phpgroupware.org/changelog [ 2 ] Secunia Advisory SA12466 http://secunia.com/advisories/12466/ Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200409-22.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2004 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/1.0 [ Part 2, Application/PGP-SIGNATURE 196bytes. ] [ Unable to print this part. ]