Debian Security Advisory
DSA-808-1 tdiary -- design error
- Date Reported:
- 12 Sep 2005
- Affected Packages:
- tdiary
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2005-2411.
- More information:
-
Yutaka Oiwa and Hiromitsu Takagi discovered a Cross-Site Request Forgery (CSRF) vulnerability in tdiary, a new generation weblog that can be exploited by remote attackers to alter the users information.
The old stable distribution (woody) does not contain tdiary packages.
For the stable distribution (sarge) this problem has been fixed in version 2.0.1-1sarge1.
For the unstable distribution (sid) this problem has been fixed in version 2.0.2-1.
We recommend that you upgrade your tdiary packages.
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1.dsc
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1.diff.gz
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1.orig.tar.gz
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-contrib_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-mode_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-plugin_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-theme_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary_2.0.1-1sarge1_all.deb
- http://security.debian.org/pool/updates/main/t/tdiary/tdiary-mode_2.0.1-1sarge1_all.deb
MD5 checksums of the listed files are available in the original advisory.