|
Family: Debian Local Security Checks --> Category: infos
[DSA371] DSA-371-1 perl Vulnerability Scan
Vulnerability Scan Summary DSA-371-1 perl
Detailed Explanation for this Vulnerability Test
A cross-site scripting vulnerability exists in the start_form()
function in CGI.pm. This function outputs user-controlled data into
the action attribute of a form element without sanitizing it, allowing
a remote user to execute arbitrary web script within the context of
the generated page. Any program which uses this function in the
CGI.pm module may be affected.
For the current stable distribution (woody) this problem has been fixed
in version 5.6.1-8.3.
For the unstable distribution (sid) this problem has been fixed in
version 5.8.0-19.
We recommend that you update your perl package.
Solution : http://www.debian.org/security/2003/dsa-371
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|