Package: gforge Version: 4.5.14-19 Severity: important Tags: security The vulnerability is reported in version 4.5.11. Maybe this versions may also be affected.
Input passed to the "words" parameter in search/advanced_search.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Solution: Edit the source code to ensure that input is properly sanitised. Reference: http://secunia.com/advisories/23675/ Thanks in advanced. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-486 Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) -- .''`. : :' : Alex de Oliveira Silva | enerv `. `' www.enerv.net `- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]