Debian Security Advisory

DSA-1559-1 phpgedview -- insufficient input sanitising

Date Reported:
27 Apr 2008
Affected Packages:
phpgedview
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 443901.
In Mitre's CVE dictionary: CVE-2007-5051.
More information:

It was discovered that phpGedView, an application to provide online access to genealogical data, performed insufficient input sanitising on some parameters, making it vulnerable to cross site scripting.

For the stable distribution (etch), this problem has been fixed in version 4.0.2.dfsg-3.

For the unstable distribution (sid), this problem has been fixed in version 4.1.e+4.1.1-2.

We recommend that you upgrade your phpgedview package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg.orig.tar.gz
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3.diff.gz
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-themes_4.0.2.dfsg-3_all.deb
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-places_4.0.2.dfsg-3_all.deb
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3_all.deb
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-languages_4.0.2.dfsg-3_all.deb

MD5 checksums of the listed files are available in the original advisory.