U radu programskog paketa dokuwiki uočena su dva nova sigurnosna propusta koje udaljeni napadač može iskoristiti za umetanje zlonamjernog skriptnog i HTML koda.
Paket:
dokuwiki 0.x
Operacijski sustavi:
Fedora 17
Kritičnost:
4.3
Problem:
CSRF, XSS
Iskorištavanje:
udaljeno
Posljedica:
umetanje HTML i skriptnog koda
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2012-2128, CVE-2012-2129
Izvorni ID preporuke:
FEDORA-2012-6588
Izvor:
Fedora
Problem:
Sigurnosni propusti se su posljedica XSS (eng. Cross-site scripting) i CSRF (eng. Cross-site request forgery) ranjivosti prilikom prosljeđivanja parametara putem URL adrese.
Posljedica:
Udaljeni napadač spomenute ranjivosti može iskoristiti za umetanje HTML i skriptnog koda.
Rješenje:
Rješenje problema sigurnosti je korištenje dostupnih programskih nadogradnji.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-6588
2012-04-25 04:40:33
--------------------------------------------------------------------------------
Name : dokuwiki
Product : Fedora 17
Version : 0
Release : 0.11.20110525.a.fc17
URL : http://www.dokuwiki.org/dokuwiki
Summary : Standards compliant simple to use wiki
Description :
DokuWiki is a standards compliant, simple to use Wiki, mainly aimed at creating
documentation of any kind. It has a simple but powerful syntax which makes sure
the datafiles remain readable outside the Wiki and eases the creation of
structured texts.
All data is stored in plain text files no database is required.
--------------------------------------------------------------------------------
Update Information:
Fix XSS flaw
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #815122 - CVE-2012-2128 CVE-2012-2129 dokuwiki: XSS and CSRF due
improper escaping of 'target' parameter in preprocessing edit form data
https://bugzilla.redhat.com/show_bug.cgi?id=815122
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update dokuwiki' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke