Date: Thu, 27 Jul 2006 14:56:58 +0200
From: Krischan Jodies <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Cross Site Scripting vulnerability in ipcalc

Dear Bartosz,

ipcalc made it to bugtraq this week, because someone discovered a xss
vulnerability in the cgi script. We have this script in debian stable:

oscar:~# dpkg -L ipcalc
/.
/usr
/usr/bin
/usr/bin/ipcalc
/usr/share
/usr/share/doc
/usr/share/doc/ipcalc
/usr/share/doc/ipcalc/README
/usr/share/doc/ipcalc/README.Debian
/usr/share/doc/ipcalc/copyright
/usr/share/doc/ipcalc/changelog.Debian.gz
/usr/share/man
/usr/share/man/man1
/usr/share/man/man1/ipcalc.1.gz
/usr/share/man/man1/ipcalc_cgi.1.gz
/usr/lib
/usr/lib/cgi-bin
/usr/lib/cgi-bin/ipcalc

The fix is trivial, and I would suggest to apply it to the stable version:


oscar:/home/kjodies# diff -u ipcalc ipcalc.new
--- ipcalc      2006-07-27 14:52:31.453712512 +0200
+++ ipcalc.new  2006-07-27 14:53:16.011938632 +0200
@@ -11,7 +11,7 @@
 $|=1;
 $ipcalc = "/usr/bin/ipcalc";

-$actionurl = $ENV{'REQUEST_URI'};
+$actionurl = $ENV{'SCRIPT_URL'};

               use CGI;
 $query = new CGI;
 $host  = $query->param('host');

For unstable I published a new release:

http://jodies.de/ipcalc-archive/ipcalc-0.41.tar.gz

It contains no changes except the above patch.

Greetings,

Krischan


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to