Executive Summary
Summary | |
---|---|
Title | New xapian-omega packages fix cross-site scripting |
Informations | |||
---|---|---|---|
Name | DSA-1882 | First vendor Publication | 2009-09-09 |
Vendor | Debian | Last vendor Modification | 2009-09-09 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It was discovered that xapian-omega, a CGI interface for searching xapian databases, is not properly escaping user supplied input when printing exceptions. An attacker can use this to conduct cross-site scripting attacks via crafted search queries resulting in an exception and steal potentially sensitive data from web applications running on the same domain or embedding the search engine into a website. For the oldstable distribution (etch), this problem has been fixed in version 0.9.9-1+etch1. For the stable distribution (lenny), this problem has been fixed in version 1.0.7-3+lenny1. For the testing (squeeze) and unstable (sid) distribution, this problem will be fixed soon. We recommend that you upgrade your xapian-omega packages. |
Original Source
Url : http://www.debian.org/security/2009/dsa-1882 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13473 | |||
Oval ID: | oval:org.mitre.oval:def:13473 | ||
Title: | DSA-1882-1 xapian-omega -- missing input sanitisation | ||
Description: | It was discovered that xapian-omega, a CGI interface for searching xapian databases, is not properly escaping user supplied input when printing exceptions. An attacker can use this to conduct cross-site scripting attacks via crafted search queries resulting in an exception and steal potentially sensitive data from web applications running on the same domain or embedding the search engine into a website. For the oldstable distribution, this problem has been fixed in version 0.9.9-1+etch1. For the stable distribution, this problem has been fixed in version 1.0.7-3+lenny1. For the testing and unstable distribution, this problem will be fixed soon. We recommend that you upgrade your xapian-omega packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1882-1 CVE-2009-2947 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | xapian-omega |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7752 | |||
Oval ID: | oval:org.mitre.oval:def:7752 | ||
Title: | DSA-1882 xapian-omega -- missing input sanitisation | ||
Description: | It was discovered that xapian-omega, a CGI interface for searching xapian databases, is not properly escaping user supplied input when printing exceptions. An attacker can use this to conduct cross-site scripting attacks via crafted search queries resulting in an exception and steal potentially sensitive data from web applications running on the same domain or embedding the search engine into a website. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1882 CVE-2009-2947 | Version: | 3 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | xapian-omega |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-09-15 | Name : Debian Security Advisory DSA 1882-1 (xapian-omega) File : nvt/deb_1882_1.nasl |
2009-09-15 | Name : FreeBSD Ports: xapian-omega File : nvt/freebsd_xapian-omega.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
57962 | Xapian Omega Exception Reporting Unspecified XSS Xapian Omega contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate unspecified variables upon submission to the unspecified script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1882.nasl - Type : ACT_GATHER_INFO |
2009-09-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_b46f3a1ea05211dea649000c2955660f.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:28:48 |
|