Debian Security Advisory
DSA-1778-1 mahara -- insufficient input sanitization
- Date Reported:
- 22 Apr 2009
- Affected Packages:
- mahara
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2009-0664.
- More information:
-
It was discovered that mahara, an electronic portfolio, weblog, and resume builder, is prone to cross-site scripting (XSS) attacks because of missing input sanitization of the introduction text field in user profiles and any text field in a user view.
The oldstable distribution (etch) does not contain mahara.
For the stable distribution (lenny), this problem has been fixed in version 1.0.4-4+lenny2.
For the testing distribution (squeeze), this problem will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in version 1.1.3-1.
We recommend that you upgrade your mahara packages.
- Fixed in:
-
Debian GNU/Linux 5.0 (lenny)
- Source:
- http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny2.dsc
- http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny2.diff.gz
- http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny2.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny2_all.deb
- http://security.debian.org/pool/updates/main/m/mahara/mahara-apache2_1.0.4-4+lenny2_all.deb
- http://security.debian.org/pool/updates/main/m/mahara/mahara-apache2_1.0.4-4+lenny2_all.deb
MD5 checksums of the listed files are available in the original advisory.