Debian Security Advisory

DSA-2020-1 ikiwiki -- insufficient input sanitization

Date Reported:
20 Mar 2010
Affected Packages:
ikiwiki
Vulnerable:
Yes
Security database references:
No other external database security references currently available.
More information:

Ivan Shmakov discovered that the htmlscrubber component of ikiwiki, a wiki compiler, performs insufficient input sanitization on data:image/svg+xml URIs. As these can contain script code this can be used by an attacker to conduct cross-site scripting attacks.

For the stable distribution (lenny), this problem has been fixed in version 2.53.5.

For the testing distribution (squeeze), this problem has been fixed in version 3.20100312.

For the unstable distribution (sid), this problem has been fixed in version 3.20100312.

Fixed in:

Debian GNU/Linux 5.0 (lenny)

Source:
http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5.dsc
http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5_all.deb

MD5 checksums of the listed files are available in the original advisory.