Gentoo Logo

ht://Dig: Cross-site scripting vulnerability

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200502-16 / htdig
Release Date February 13, 2005
Latest Revision February 13, 2005: 01
Impact low
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-misc/htdig < 3.1.6-r7 >= 3.1.6-r7 All supported architectures

Related bugreports: #80602

Synopsis

ht://Dig is vulnerable to cross-site scripting attacks.

2.  Impact Information

Background

ht://Dig is an HTTP/HTML indexing and searching system.

Description

Michael Krax discovered that ht://Dig fails to validate the 'config' parameter before displaying an error message containing the parameter. This flaw could allow an attacker to conduct cross-site scripting attacks.

Impact

By sending a carefully crafted message, an attacker can inject and execute script code in the victim's browser window. This allows to modify the behaviour of ht://Dig, and/or leak session information such as cookies to the attacker.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All ht://Dig users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-misc/htdig-3.1.6-r7"

4.  References



Print

Page updated February 13, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.