Package: lwat
Version: 0.13-1
Severity: grave
Tags: security

I tested today lwat if there is it is vulnerable for malicious html code
if this values are already inside the ldap database.

I used ldif to add something like this as the cn:
 cn: </a><a href="javascript:;" onclick="window.alert('Thanks for this
 hack');" >Test User</a><a>

The result was that if I search for Test user and click on it I got a
popup with 'Thanks for this hack' in it. 

This issue is similiar to: #415379

I will attach a fix soon, and will upload it then, since I'm the
maintainer of this package ;-) 

Greetings
Patrick

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)

Versions of packages lwat depends on:
ii  apache2-mpm-prefork [apache2] 2.2.3-3.3  Traditional model for Apache HTTPD
ii  debconf [debconf-2.0]         1.5.13     Debian configuration management sy
ii  libapache2-mod-php5           5.2.0-10   server-side, HTML-embedded scripti
ii  php5                          5.2.0-10   server-side, HTML-embedded scripti
ii  php5-ldap                     5.2.0-10   LDAP module for php5
ii  smarty-gettext                1.0b1-2    provides gettext support for smart

lwat recommends no packages.

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to