Debian Security Advisory
DSA-1324-1 hiki -- missing input sanitising
- Date Reported:
- 28 Jun 2007
- Affected Packages:
- hiki
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 430691.
In Mitre's CVE dictionary: CVE-2007-2836. - More information:
-
Kazuhiro Nishiyama found a vulnerability in hiki, a Wiki engine written in Ruby, which could allow a remote attacker to delete arbitrary files which are writable to the Hiki user, via a specially crafted session parameter.
For the stable distribution (etch), this problem has been fixed in version 0.8.6-1etch1.
For the unstable distribution (sid) this problem has been fixed in version 0.8.7-1.
We recommend that you upgrade your hiki package.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/h/hiki/hiki_0.8.6-1etch1.diff.gz
- http://security.debian.org/pool/updates/main/h/hiki/hiki_0.8.6-1etch1.dsc
- http://security.debian.org/pool/updates/main/h/hiki/hiki_0.8.6.orig.tar.gz
- http://security.debian.org/pool/updates/main/h/hiki/hiki_0.8.6-1etch1.dsc
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/h/hiki/hiki_0.8.6-1etch1_all.deb
MD5 checksums of the listed files are available in the original advisory.