Debian Security Advisory

DSA-1827-1 ipplan -- insufficient input sanitising

Date Reported:
06 Jul 2009
Affected Packages:
ipplan
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 530271.
In Mitre's CVE dictionary: CVE-2009-1732.
More information:

It was discovered that ipplan, a web-based IP address manager and tracker, does not sufficiently escape certain input parameters, which allows remote attackers to conduct cross-site scripting attacks.

The oldstable distribution (etch) does not contain ipplan.

For the stable distribution (lenny), this problem has been fixed in version 4.86a-7+lenny1.

For the testing distribution (squeeze) this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in version 4.91a-1.1.

We recommend that you upgrade your ipplan packages.

Fixed in:

Debian GNU/Linux 5.0 (lenny)

Source:
http://security.debian.org/pool/updates/main/i/ipplan/ipplan_4.86a-7+lenny1.diff.gz
http://security.debian.org/pool/updates/main/i/ipplan/ipplan_4.86a.orig.tar.gz
http://security.debian.org/pool/updates/main/i/ipplan/ipplan_4.86a-7+lenny1.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/i/ipplan/ipplan_4.86a-7+lenny1_all.deb

MD5 checksums of the listed files are available in the original advisory.