Sarg: Remote execution of arbitrary code
Gentoo Linux Security Advisory
||GLSA 200803-21 / sarg
||March 12, 2008
||March 12, 2008: 01
All supported architectures
Sarg is vulnerable to the execution of arbitrary code when processed with
untrusted input files.
Sarg (Squid Analysis Report Generator) is a tool that provides many
informations about the Squid web proxy server users activities: time,
sites, traffic, etc.
Sarg doesn't properly check its input for abnormal content when
processing Squid log files.
A remote attacker using a vulnerable Squid as a proxy server or a
reverse-proxy server can inject arbitrary content into the "User-Agent"
HTTP client header, that will be processed by sarg, which will lead to
Cross-Site Scripting attacks and the theft of credentials.
There is no known workaround at this time.
All sarg users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/sarg-2.2.5"