Debian Security Advisory

DSA-1568-1 b2evolution -- insufficient input sanitising

Date Reported:
05 May 2008
Affected Packages:
b2evolution
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 410568.
In Mitre's CVE dictionary: CVE-2007-0175.
More information:

"unsticky" discovered that b2evolution, a blog engine, performs insufficient input sanitising, allowing for cross site scripting.

For the stable distribution (etch), this problem has been fixed in version 0.9.2-3+etch1.

For the unstable distribution (sid), this problem has been fixed in version 0.9.2-4.

We recommend that you upgrade your b2evolution package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/b/b2evolution/b2evolution_0.9.2-3+etch1.diff.gz
http://security.debian.org/pool/updates/main/b/b2evolution/b2evolution_0.9.2.orig.tar.gz
http://security.debian.org/pool/updates/main/b/b2evolution/b2evolution_0.9.2-3+etch1.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/b/b2evolution/b2evolution_0.9.2-3+etch1_all.deb

MD5 checksums of the listed files are available in the original advisory.