Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA371] DSA-371-1 perl


Vulnerability Assessment Details

[DSA371] DSA-371-1 perl

Vulnerability Assessment Summary
DSA-371-1 perl

Detailed Explanation for this Vulnerability Assessment

A cross-site scripting vulnerability exists in the start_form()
function in CGI.pm. This function outputs user-controlled data into
the action attribute of a form element without sanitizing it, permiting
a remote user to execute arbitrary web script within the context of
the generated page. Any program which uses this function in the
CGI.pm module may be affected.
For the current stable distribution (woody) this problem has been fixed
in version 5.6.1-8.3.
For the unstable distribution (sid) this problem has been fixed in
version 5.8.0-19.
We recommend that you update your perl package.


Solution : http://www.debian.org/security/2003/dsa-371
Network Security Threat Level: High

Networks Security ID: 8231

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Astec Helios 3000 Power Plant Monitor - New (old stock)
$1895.0
Astec Helios 3000 Power Plant Monitor - New (old stock) pictureAMX TX-CTB Transmitter (TXCTB)
$295.0
AMX TX-CTB Transmitter (TXCTB) pictureAMX Axcent3 Integrated Access Controller
$995.0
AMX Axcent3 Integrated Access Controller pictureAllot NetReality WiseWan 200 Router (Wise Wan)
$595.0
Allot NetReality WiseWan 200 Router (Wise Wan) picture


Discussions

No Discussions have been posted on this vulnerability.