This bug was fixed in the package zend-framework - 1.5.3-0ubuntu2.1
---------------
zend-framework (1.5.3-0ubuntu2.1) intrepid-security; urgency=low
* SECURITY UPDATE: (LP: #345682)
Announcement:
http://www.nabble.com/SECURITY-ADVISORY-tp22609193p22609193.html
From Zend PHP FW Mailing List:
The Zend Framework team was recently notified of an XSS attack vector in
its Zend_Filter_StripTags class.
Zend_Filter_StripTags offers the ability to strip HTML tags from text, but
also to selectively choose
which tags and specific attributes of those tags to keep.
The XSS attack vector was due to a bug in matching HTML tag attributes to
retain.
If whitespace was introduced surrounding the attribute assignment operator
or the value included newline characters,
the attribute would always be included in the final output- even if it was
not marked to retain.
A security fix has been created and released with Zend Framework 1.7.7.
Additionally, the fix has been back-ported to the 1.6, 1.5, and 1.0 release
branches.
* debian/patches/zf_Zend_Filter_security_fix.patch:
Fixes security issue according to
http://framework.zend.com/svn/framework/standard/branches/release-1.7/library/Zend/Filter/StripTags.php
-- Stephan Hermann <[email protected]> Thu, 14 May 2009 12:31:49 +0000
** Changed in: zend-framework (Ubuntu Jaunty)
Status: Fix Committed => Fix Released
--
XSS attack vector in Zend_Filter_StripTags
https://bugs.launchpad.net/bugs/345682
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs