Gentoo Logo

SiteBar: Multiple issues


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200711-05 / sitebar
Release Date November 06, 2007
Latest Revision November 06, 2007: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-apps/sitebar < 3.3.9 >= 3.3.9 All supported architectures

Related bugreports: #195810


Multiple issues have been identified in SiteBar that might allow execution of arbitrary code and arbitrary file disclosure.

2.  Impact Information


SiteBar is a PHP application that allows users to store their bookmarks on a web server.


Tim Brown discovered these multiple issues: the translation module does not properly sanitize the value to the "dir" parameter (CVE-2007-5491, CVE-2007-5694); the translation module also does not sanitize the values of the "edit" and "value" parameters which it passes to eval() and include() (CVE-2007-5492, CVE-2007-5693); the log-in command does not validate the URL to redirect users to after logging in (CVE-2007-5695); SiteBar also contains several cross-site scripting vulnerabilities (CVE-2007-5692).


An authenticated attacker in the "Translators" or "Admins" group could execute arbitrary code, read arbitrary files and possibly change their permissions with the privileges of the user running the web server by passing a specially crafted parameter string to the "translator.php" file. An unauthenticated attacker could entice a user to browse a specially crafted URL, allowing for the execution of script code in the context of the user's browser, for the theft of browser credentials or for a redirection to an arbitrary web site after login.

3.  Resolution Information


There is no known workaround at this time.


All SiteBar users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/sitebar-3.3.9"

4.  References


Page updated November 06, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.