Your message dated Wed, 27 Sep 2006 16:02:22 -0700 with message-id <[EMAIL PROTECTED]> and subject line Bug#389361: fixed in elog 2.6.2+r1719-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: elog Version: 2.6.1+r1642-1 Severity: grave Tags: security Justification: user security hole Hi, when editing a log entry in HTML mode, elog accepts arbitrary JavaScript code. This code will be executed in the browser of other users viewing the entry (provided they have JavaScript enabled), thus exposing the users to a XSS (cross site scripting) attack. To reproduce the problem, add or edit a log entry, switch to HTML mode and enter the following code snippet: --------------------------------8<------------------------------ <script type='text/javascript'> <!-- alert("There seems to be the possibility of an XSS attack..."); //--> </script> --------------------------------8<------------------------------ When viewing the entry, a JavaScript Popup should appear. To remedy the problem, all <script> tags should be filtered out (or better yet, only "safe" HTML code should be allowed). At the very least, it should be possible to disable HTML entries (and this should be the default, with a big warning if someone wants to change it). Cheers, Til -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing'), (200, 'experimental') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16-2-amd64-k8-smp Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages elog depends on: ii adduser 3.97 Add and remove users and groups ii libc6 2.3.6.ds1-4 GNU C Library: Shared libraries elog recommends no packages. -- no debconf information
--- End Message ---
--- Begin Message ---Source: elog Source-Version: 2.6.2+r1719-1 We believe that the bug you reported is fixed in the latest version of elog, which is due to be installed in the Debian FTP archive: elog_2.6.2+r1719-1.diff.gz to pool/main/e/elog/elog_2.6.2+r1719-1.diff.gz elog_2.6.2+r1719-1.dsc to pool/main/e/elog/elog_2.6.2+r1719-1.dsc elog_2.6.2+r1719-1_i386.deb to pool/main/e/elog/elog_2.6.2+r1719-1_i386.deb elog_2.6.2+r1719.orig.tar.gz to pool/main/e/elog/elog_2.6.2+r1719.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Recai OktaÅ <[EMAIL PROTECTED]> (supplier of updated elog package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 28 Sep 2006 01:36:38 +0300 Source: elog Binary: elog Architecture: source i386 Version: 2.6.2+r1719-1 Distribution: unstable Urgency: critical Maintainer: Recai OktaÅ <[EMAIL PROTECTED]> Changed-By: Recai OktaÅ <[EMAIL PROTECTED]> Description: elog - Logbook system to manage notes through a Web interface Closes: 389361 Changes: elog (2.6.2+r1719-1) unstable; urgency=critical . * Urgency set to critical because of the security issues. * New upstream release grabbed from Subversion (r1719). + Fix an XSS vulnerability, which occurs when editing a log entry in HTML mode. (Closes: #389361) Files: 9b57b5e7ec8d77485ed8c66646d1a80b 571 web optional elog_2.6.2+r1719-1.dsc b317563258ee8b0b3e2375a5f5e33315 663231 web optional elog_2.6.2+r1719.orig.tar.gz dd4004ac4d48871aa6bc4e5a18a0fe9f 12347 web optional elog_2.6.2+r1719-1.diff.gz 8abf9e948743707e400409fdfe63ac55 653274 web optional elog_2.6.2+r1719-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFFGv6VnA44mz/SXIQRAhOvAJ49kkB3+thIEGLEYwYcSfzM4rSpJgCfRnDS cg6CD85jsNiB1s2IrqU0QlQ= =x00F -----END PGP SIGNATURE-----
--- End Message ---

