Debian Security Advisory

DSA-711-1 info2www -- missing input sanitising

Date Reported:
19 Apr 2005
Affected Packages:
info2www
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 281655.
In Mitre's CVE dictionary: CVE-2004-1341.
More information:

Nicolas Gregoire discovered a cross-site scripting vulnerability in info2www, a converter for info files to HTML. A malicious person could place a harmless looking link on the web that could cause arbitrary commands to be executed in the browser of the victim user.

For the stable distribution (woody) this problem has been fixed in version 1.2.2.9-20woody1.

For the unstable distribution (sid) this problem has been fixed in version 1.2.2.9-23.

We recommend that you upgrade your info2www package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1.dsc
http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1.diff.gz
http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/i/info2www/info2www_1.2.2.9-20woody1_all.deb

MD5 checksums of the listed files are available in the original advisory.