Debian Security Advisory
DSA-1568-1 b2evolution -- insufficient input sanitising
- Date Reported:
- 05 May 2008
- Affected Packages:
- b2evolution
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 410568.
In Mitre's CVE dictionary: CVE-2007-0175. - More information:
-
"unsticky" discovered that b2evolution, a blog engine, performs insufficient input sanitising, allowing for cross site scripting.
For the stable distribution (etch), this problem has been fixed in version 0.9.2-3+etch1.
For the unstable distribution (sid), this problem has been fixed in version 0.9.2-4.
We recommend that you upgrade your b2evolution package.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/b/b2evolution/b2evolution_0.9.2-3+etch1.diff.gz
- http://security.debian.org/pool/updates/main/b/b2evolution/b2evolution_0.9.2.orig.tar.gz
- http://security.debian.org/pool/updates/main/b/b2evolution/b2evolution_0.9.2-3+etch1.dsc
- http://security.debian.org/pool/updates/main/b/b2evolution/b2evolution_0.9.2.orig.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/b/b2evolution/b2evolution_0.9.2-3+etch1_all.deb
MD5 checksums of the listed files are available in the original advisory.