VID |
210080 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The GForge software is vulnerable to a cross-site scripting vulnerability in the 'cvsweb.php' script. GForge is a Web-based collaborative development environment. Gforge versions 4.6b2 and earlier are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the 'confirm_hash' parameter of the 'account/verify.php' script. This vulnerability could allow a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* References: http://gforge.org/tracker/?func=detail&atid=105&aid=3094&group_id=1 http://www.frsirt.com/english/advisories/2007/3356 http://secunia.com/advisories/27046
* Platforms Affected: Gforge Group, Gforge versions 4.6b2 and earlier Linux Any version |
Recommendation |
Upgrade to the latest patched version of Gforge, available from the Gforge Web site at http://gforgegroup.com/downloads
For Debian Linux: Upgrade to the fixed version of gforge package, as listed in Debian Security Advisory DSA-1383-1 at http://www.us.debian.org/security/2007/dsa-1383
For other distributions: Contact your vendor for upgrade or patch information. |
Related URL |
CVE-2007-3918 (CVE) |
Related URL |
25923 (SecurityFocus) |
Related URL |
36955 (ISS) |
|