Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA371] DSA-371-1 perl


Vulnerability Assessment Details

[DSA371] DSA-371-1 perl

Vulnerability Assessment Summary
DSA-371-1 perl

Detailed Explanation for this Vulnerability Assessment

A cross-site scripting vulnerability exists in the start_form()
function in CGI.pm. This function outputs user-controlled data into
the action attribute of a form element without sanitizing it, permiting
a remote user to execute arbitrary web script within the context of
the generated page. Any program which uses this function in the
CGI.pm module may be affected.
For the current stable distribution (woody) this problem has been fixed
in version 5.6.1-8.3.
For the unstable distribution (sid) this problem has been fixed in
version 5.8.0-19.
We recommend that you update your perl package.


Solution : http://www.debian.org/security/2003/dsa-371
Network Security Threat Level: High

Networks Security ID: 8231

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

HP PROLIANT BL460C G8 SERVER TWO E5-2667V2 3.30GHZ 32GB 1.6TB SSD
$2059.0
HP PROLIANT BL460C G8 SERVER TWO E5-2667V2 3.30GHZ 32GB 1.6TB SSD pictureDELL POWEREDGE M915 SERVER FOUR AMD 6378 2.40GHZ 512GB 2 X 1TB SATA
$5569.0
DELL POWEREDGE M915 SERVER FOUR AMD 6378 2.40GHZ 512GB 2 X 1TB SATA pictureDELL POWEREDGE M910 SERVER TWO E7-2870 2.4GHZ 32GB NO HDD
$1089.0
DELL POWEREDGE M910 SERVER TWO E7-2870 2.4GHZ 32GB NO HDD picture


Discussions

No Discussions have been posted on this vulnerability.