Executive Summary
Summary | |
---|---|
Title | New Faq-O-Matic packages fix cross-site scripting vulnerability |
Informations | |||
---|---|---|---|
Name | DSA-109 | First vendor Publication | 2002-02-13 |
Vendor | Debian | Last vendor Modification | 2002-02-13 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Due to unescaped HTML code Faq-O-Matic returned unverified scripting code to the browser. With some tweaking this enables an attacker to steal cookies from one of the Faq-O-Matic moderators or the admin. Cross-Site Scripting is a type of problem that allows a malicious person to make another person run some JavaScript in their browser. The JavaScript is executed on the victims machine and is in the context of the website running the Faq-O-Matic Frequently Asked Question manager. This problem has been fixed in version 2.603-1.2 for the stable Debian distribution and version 2.712-2 for the current testing/unstable distribution. We recommend that you upgrade your faqomatic package if you have it installed. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 2.2 alias potato |
Original Source
Url : http://www.debian.org/security/2002/dsa-109 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 109-1 (faqomatic) File : nvt/deb_109_1.nasl |
2005-11-03 | Name : Various dangerous cgi scripts File : nvt/dangerous_cgis.nasl |
2005-11-03 | Name : Faq-O-Matic fom.cgi XSS File : nvt/faq_o_matic_xss.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
8661 | Faq-O-Matic fom.cgi cmd Parameter Error Message XSS Faq-O-Matic contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'cmd' variables upon submission to the 'fom.cgi' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Faq-O-Matic fom.cgi access RuleID : 2208-community - Revision : 17 - Type : SERVER-WEBAPP |
2014-01-10 | Faq-O-Matic fom.cgi access RuleID : 2208 - Revision : 17 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-10-21 | Name : A web CGI is vulnerable to cross-site scripting attacks. File : faq_o_matic_xss.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-109.nasl - Type : ACT_GATHER_INFO |
2003-06-17 | Name : The remote web server may contain some dangerous CGI scripts. File : dangerous_cgis.nasl - Type : ACT_ATTACK |
Alert History
Date | Informations |
---|---|
2014-02-17 11:25:53 |
|