Hi, On Tue, Oct 03, 2017 at 08:55:47PM +0200, Salvatore Bonaccorso wrote: > Hi > > On Mon, Oct 02, 2017 at 09:19:17PM +0200, Moritz Muehlenhoff wrote: > > On Thu, Mar 30, 2017 at 02:45:21PM -0400, Antoine Beaupre wrote: > > > Package: guacamole-client > > > X-Debbugs-CC: [email protected] > > > [email protected] > > > Severity: normal > > > Tags: security > > > Version: 0.9.9+dfsg-1 > > > > > > Hi, > > > > > > the following vulnerability was published for guacamole. > > > > > > CVE-2016-1566[0]: > > > | Cross-site scripting (XSS) vulnerability in the file browser in > > > | Guacamole 0.9.8 and 0.9.9, when file transfer is enabled to a location > > > | shared by multiple users, allows remote authenticated users to inject > > > | arbitrary web script or HTML via a crafted filename. NOTE: this > > > | vulnerability was fixed in guacamole.war on 2016-01-13, but the > > > | version number was not changed. > > > > What's the status? More than half a year has passed. > > Upstream commit, afaics > > https://github.com/glyptodon/guacamole-client/commit/7da13129c432d1c0a577342a9bf23ca2bde9c367
Promted by the question from Markus: it looks no released version in Debian actually ever contained the broken code in guacFileBrowser.js as the version uploaded to Debian as 0.9.9+dfsg-1 was already with the fixed code (note that the upstream versions are quite useless here as they seem to have released twice 0.9.9). Regards, Salvatore

