Debian Security Advisory

DLA-68-1 fex -- LTS security update

Date Reported:
30 Sep 2014
Affected Packages:
fex
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2014-3875, CVE-2014-3876, CVE-2014-3877.
More information:
  • [CVE-2014-3875]

    When inserting encoded newline characters into a request to rup, additional HTTP headers can be injected into the reply, as well as new HTML code on the top of the website.

  • [CVE-2014-3876]

    The parameter akey is reflected unfiltered as part of the HTML page. Some characters are forbidden in the GET parameter due to filtering of the URL, but this can be circumvented by using a POST parameter. Nevertheless, this issue is exploitable via the GET parameter alone, with some user interaction.

  • [CVE-2014-3877]

    The parameter addto is reflected only slightly filtered back to the user as part of the HTML page. Some characters are forbidden in the GET parameter due to filtering of the URL, but this can be circumvented by using a POST parameter. Nevertheless, this issue is exploitable via the GET parameter alone, with some user interaction.

For Debian 6 Squeeze, these issues have been fixed in fex version 20100208+debian1-1+squeeze4