f77f85dd37
SECURITY ADVISORY 20th March 2002 ---------------------------------------------------------------------- Program: analog Versions: all versions prior to 5.22 Operating systems: all ---------------------------------------------------------------------- Yuji Takahashi discovered a bug in analog which allows a cross-site scripting type attack. It is easy for an attacker to insert arbitrary strings into any web server logfile. If these strings are then analysed by analog, they can appear in the report. By this means an attacker can introduce arbitrary Javascript code, for example, into an analog report produced by someone else and read by a third person. Analog already attempted to encode unsafe characters to avoid this type of attack, but the conversion was incomplete. Although it is not known that this bug has been exploited, it is easy to exploit, and all users are advised to upgrade to version 5.22 of analog immediately. The URL for analog is http://www.analog.cx/ I apologise for the inconvenience. Thank you to Yuji Takahashi, Motonobu Takahashi and Takayuki Matsuki for their help with this bug. Stephen Turner analog-author@lists.isite.net
4 lines
200 B
Plaintext
4 lines
200 B
Plaintext
MD5 (analog-5.22.tar.gz) = 7548e31ac6b21bec31966f98a789b426
|
|
RMD160 (analog-5.22.tar.gz) = c5f1094ec2328e3dd38bd262aae5909ea9858d54
|
|
SHA1 (analog-5.22.tar.gz) = 10d8ff187398243778fad0929e2a53f863ecf275
|