[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20140320145105.GA4341@SD6-Casa.iuculano.it>
Date: Thu, 20 Mar 2014 15:51:05 +0100
From: Giuseppe Iuculano <iuculano@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2882-1] extplorer security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2882-1 security@...ian.org
http://www.debian.org/security/ Giuseppe Iuculano
March 20, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : extplorer
CVE ID : CVE-2013-5951
Debian Bug : 741908
Multiple cross-site scripting (XSS) vulnerabilities have been discovered
in extplorer, a web file explorer and manager using Ext JS.
A remote attackers can inject arbitrary web script or HTML code via a
crafted string in the URL to application.js.php, admin.php, copy_move.php,
functions.php, header.php and upload.php.
For the oldstable distribution (squeeze), this problem has been fixed in
version 2.1.0b6+dfsg.2-1+squeeze2.
For the stable distribution (wheezy), this problem has been fixed in
version 2.1.0b6+dfsg.3-4+deb7u1.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your extplorer packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
iEYEARECAAYFAlMrAFkACgkQNxpp46476aorXwCfaVajYfDAGJvnyCE6BbPzPiYP
ZdwAn1yvknfSaW6jm4WQHcJpmP8hzGP1
=MUMv
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists