Package: elog
Version: 2.6.1+r1642-1
Severity: grave
Tags: security
Justification: user security hole

Hi,

when editing a log entry in HTML mode, elog accepts arbitrary JavaScript
code. This code will be executed in the browser of other users viewing the
entry (provided they have JavaScript enabled), thus exposing the users
to a XSS (cross site scripting) attack.

To reproduce the problem, add or edit a log entry, switch to HTML mode
and enter the following code snippet:

--------------------------------8<------------------------------
<script type='text/javascript'>
<!--
  alert("There seems to be the possibility of an XSS attack...");
//-->
</script>
--------------------------------8<------------------------------

When viewing the entry, a JavaScript Popup should appear.

To remedy the problem, all <script> tags should be filtered out (or
better yet, only "safe" HTML code should be allowed). At the very least,
it should be possible to disable HTML entries (and this should be the
default, with a big warning if someone wants to change it).

Cheers, Til


-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing'), (200, 'experimental')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-2-amd64-k8-smp
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages elog depends on:
ii  adduser                      3.97        Add and remove users and groups
ii  libc6                        2.3.6.ds1-4 GNU C Library: Shared libraries

elog recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to