Debian Security Advisory
DSA-1559-1 phpgedview -- insufficient input sanitising
- Date Reported:
- 27 Apr 2008
- Affected Packages:
- phpgedview
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 443901.
In Mitre's CVE dictionary: CVE-2007-5051. - More information:
-
It was discovered that phpGedView, an application to provide online access to genealogical data, performed insufficient input sanitising on some parameters, making it vulnerable to cross site scripting.
For the stable distribution (etch), this problem has been fixed in version 4.0.2.dfsg-3.
For the unstable distribution (sid), this problem has been fixed in version 4.1.e+4.1.1-2.
We recommend that you upgrade your phpgedview package.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg.orig.tar.gz
- http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3.diff.gz
- http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3.dsc
- http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-themes_4.0.2.dfsg-3_all.deb
- http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-places_4.0.2.dfsg-3_all.deb
- http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3_all.deb
- http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-languages_4.0.2.dfsg-3_all.deb
- http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-places_4.0.2.dfsg-3_all.deb
MD5 checksums of the listed files are available in the original advisory.