Debian Security Advisory
DSA-2020-1 ikiwiki -- insufficient input sanitization
- Date Reported:
- 20 Mar 2010
- Affected Packages:
- ikiwiki
- Vulnerable:
- Yes
- Security database references:
- No other external database security references currently available.
- More information:
-
Ivan Shmakov discovered that the htmlscrubber component of ikiwiki, a wiki compiler, performs insufficient input sanitization on data:image/svg+xml URIs. As these can contain script code this can be used by an attacker to conduct cross-site scripting attacks.
For the stable distribution (lenny), this problem has been fixed in version 2.53.5.
For the testing distribution (squeeze), this problem has been fixed in version 3.20100312.
For the unstable distribution (sid), this problem has been fixed in version 3.20100312.
- Fixed in:
-
Debian GNU/Linux 5.0 (lenny)
- Source:
- http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5.dsc
- http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5.tar.gz
- http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5_all.deb
MD5 checksums of the listed files are available in the original advisory.