Debian Security Advisory

DSA-1818-1 gforge -- insufficient input sanitising

Date Reported:
18 Jun 2009
Affected Packages:
Security database references:
No other external database security references currently available.
More information:

Laurent Almeras and Guillaume Smet have discovered a possible SQL injection vulnerability and cross-site scripting vulnerabilities in gforge, a collaborative development tool. Due to insufficient input sanitising, it was possible to inject arbitrary SQL statements and use several parameters to conduct cross-site scripting attacks.

For the stable distribution (lenny), these problem have been fixed in version 4.7~rc2-7lenny1.

The oldstable distribution (etch), these problems have been fixed in version 4.5.14-22etch11.

For the testing distribution (squeeze), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in version 4.7.3-2.

We recommend that you upgrade your gforge packages.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Architecture-independent component:

Debian GNU/Linux 5.0 (lenny)

Architecture-independent component:

MD5 checksums of the listed files are available in the original advisory.