Package: gforge
Version: 4.5.14-19
Severity: important
Tags: security

The vulnerability is reported in version 4.5.11. Maybe this versions may also 
be affected.

Input passed to the "words" parameter in search/advanced_search.php is not 
properly sanitised 
before being returned to the user. This can be exploited to execute arbitrary 
HTML and script 
code in a user's browser session in context of an affected site.

Solution:
Edit the source code to ensure that input is properly sanitised.

Reference: http://secunia.com/advisories/23675/

Thanks in advanced.


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-486
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)


-- 
   .''`.  
  : :' :    Alex de Oliveira Silva | enerv
  `. `'     www.enerv.net
    `- 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to