Your message dated Mon, 19 Dec 2011 10:56:30 +0800
with message-id <4eeea7de.8070...@goirand.fr>
and subject line Also fixed in Lenny
has caused the Debian Bug report #637584,
regarding HTML injection
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
637584: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637584
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:dtc
Version: 0.32.10-2
Severity: grave
Tags: security upstream
dtc does not escape variables in HTML output in many places. An example
is the "Domain root TXT record:" field on the "DNS and MX" page where it
is possible to enter values such as
This is fun."><strong>Isn't it?</strong><input type="hidden
In combination with JavaScript and asking the admin to visit the page
under some pretense this can probably give interesting results.
Ansgar
--- End Message ---
--- Begin Message ---
--- End Message ---