CVE-2005-2761
CVSS4.3
发布时间 :2005-08-31 13:07:00
修订时间 :2008-09-05 16:52:37
NMCOPS    

[原文]Cross-site scripting (XSS) vulnerability in phpGroupWare 0.9.16.000 allows administrators to inject arbitrary web script or HTML by modifying the main screen message.


[CNNVD]phpGroupWare 跨站脚本攻击漏洞(CNNVD-200508-322)

        phpGroupWare 0.9.16.000中存在跨站脚本攻击(XSS)漏洞。这使得管理员可以通过修改主窗口消息注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2761
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2761
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-322
(官方数据源) CNNVD

- 其它链接及资源

http://secunia.com/advisories/16558
(VENDOR_ADVISORY)  SECUNIA  16558
http://savannah.gnu.org/bugs/?func=detailitem&item_id=13863
(VENDOR_ADVISORY)  MISC  http://savannah.gnu.org/bugs/?func=detailitem&item_id=13863
http://www.debian.org/security/2005/dsa-798
(UNKNOWN)  DEBIAN  DSA-798
http://securitytracker.com/id?1014832
(UNKNOWN)  SECTRACK  1014832

- 漏洞信息

phpGroupWare 跨站脚本攻击漏洞
中危 跨站脚本
2005-08-31 00:00:00 2005-10-20 00:00:00
远程  
        phpGroupWare 0.9.16.000中存在跨站脚本攻击(XSS)漏洞。这使得管理员可以通过修改主窗口消息注入任意Web脚本或HTML。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        PHPGroupWare PHPGroupWare 0.9.16 .006
        PhPGroupWare phpgroupware-0.9.16.007.tar.gz
        http://prdownloads.sourceforge.net/phpgroupware/phpgroupware-0.9.16.00 7.tar.gz
        PHPGroupWare PHPGroupWare 0.9.16 RC1
        PhPGroupWare phpgroupware-0.9.16.007.tar.gz
        http://prdownloads.sourceforge.net/phpgroupware/phpgroupware-0.9.16.00 7.tar.gz
        PHPGroupWare PHPGroupWare 0.9.16 .005
        Debian phpgroupware-addressbook_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-addressbook_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-admin_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-admin_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-bookmarks_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-bookmarks_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-calendar_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-calendar_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-chat_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-chat_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-comic_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-comic_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-core_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-core_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-developer-tools_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-developer-tools_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-dj_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-dj_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-eldaptir_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-eldaptir_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-email_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-email_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-etemplate_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-etemplate_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-felamimail_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-felamimail_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-filemanager_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-filemanager_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-folders_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-folders_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-forum_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-forum_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-ftp_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-ftp_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-fudforum_0.9.16.005-3.sarge2_all.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupwa re-fudforum_0.9.16.005-3.sarge2_all.deb
        Debian phpgroupware-headlines_0.9.16.005-3.sarge2_

- 漏洞信息 (F39819)

Debian Linux Security Advisory 798-1 (PacketStormID:F39819)
2005-09-05 00:00:00
Debian  debian.org
advisory,web,php,vulnerability
linux,debian
CVE-2005-2498,CVE-2005-2600,CVE-2005-2761
[点击下载]

Debian Security Advisory DSA 798-1 - Several vulnerabilities have been discovered in phpgroupware, a web based groupware system written in PHP.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 798-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
September 2nd, 2005                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : phpgroupware
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2498 CAN-2005-2600 CAN-2005-2761

Several vulnerabilities have been discovered in phpgroupware, a web
based groupware system written in PHP.  The Common Vulnerabilities and
Exposures project identifies the following problems:

CAN-2005-2498

    Stefan Esser discovered another vulnerability in the XML-RPC
    libraries that allows injection of arbitrary PHP code into eval()
    statements.  The XMLRPC component has been disabled.

CAN-2005-2600

    Alexander Heidenreich discovered a cross-site scriptiong problem
    in the tree view of FUD Forum Bulletin Board Software, which is
    also present in phpgroupware.

CAN-2005-2761

    A global cross-site scripting fix has also been included that
    protects against potential malicious scripts embedded in CSS and
    xmlns in various parts of the application and modules.

This update also contains a postinst bugfix that has been approved for
the next update to the stable release.

For the old stable distribution (woody) these problems don't apply.

For the stable distribution (sarge) these problems have been fixed in
version 0.9.16.005-3.sarge2.

For the unstable distribution (sid) these problems have been fixed in
version 0.9.16.008.

We recommend that you upgrade your phpgroupware packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.005-3.sarge2.dsc
      Size/MD5 checksum:     1665 e10b74698fb0ccd70d9960c4e9745224
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.005-3.sarge2.diff.gz
      Size/MD5 checksum:    36212 ce2653530ea7790676d68687ac9ab89a
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.005.orig.tar.gz
      Size/MD5 checksum: 19442629 5edd5518e8f77174c12844f9cfad6ac4

  Architecture independent components:

    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-addressbook_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   176408 e62845031a7af8182d876d93ce3a653d
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-admin_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   186202 70608b587089d644a3c2ff787f6ef3a0
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-bookmarks_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   100830 97695db70fdda862347531f7b22b40cd
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-calendar_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   323858 db8259d262257e59a620113a97dc5a75
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-chat_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    23068 57ecbc9bed7823851eef44102e59e36d
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-comic_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   434086 f8c1e175ab1b1dc0b337ca47f3670f30
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-core_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:     6388 690fb88e32c50d3d00f440362c27dc78
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-developer-tools_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    33196 dab4c5133ea41f23a8752d93e8bd9786
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-dj_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    42654 9db6fec8e4687d8fe6099a467a8246db
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-eldaptir_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    50302 f4aeb63d1aeaa72c2bbfa6a5c0f8f247
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-email_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:  1117628 e467218f15060c0edbabaa85cc6d561e
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-etemplate_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:  1329298 95e88686c6212b6b1fcbfe404aef76ea
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-felamimail_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   180022 5930fda4d00b9814600dd3164243e678
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-filemanager_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    91478 d2bd73cc22569c599fcadbedcfe1abb6
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-folders_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   166208 3b310fc7dedb0c055e1bbb451b61edd8
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-forum_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    45422 37e0f53559aa145decf9ee82906f6225
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-ftp_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    36296 e196baee2c1c89fc3872ea91b4046845
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-fudforum_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:  1355378 5453aa07a4c4372f247a994d7122170d
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-headlines_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    63786 533a084f5b12d9471fd0bf8e7eb471a1
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-hr_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    18712 feaa03f55c431cb7265c98dd5ea3ccbb
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-img_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:     8472 4595ab292c8139cbe4596754403a471a
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-infolog_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   136256 9f5270506681b88bc7b55c459e7c6ab6
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-manual_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    90472 8a82ed20e8bb22e098610bf988338966
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-messenger_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    25864 fe33aebc1fe6887b3a36624139216092
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-news-admin_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    41170 971b81d589f9ec41661260c666d7b0ac
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-nntp_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    46804 749dcf3257343b66b0d866fdfee0a933
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-notes_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    34828 4135f525d65dafde78ab72da65e84ab7
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phonelog_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    20566 cca6d535bd572adb89be5337c2ea4081
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phpbrain_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    40058 e4fd11ffcc187d218e8e761443210de2
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phpgwapi_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:  9677508 a2e03ccffbc07f28b7e40610a223173b
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-phpsysinfo_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   116316 ea045a4a3bc0b30fefa3105d781f1e6b
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-polls_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    31390 42add8aa672fcbad2bc45bcc86de345f
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-preferences_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    59496 907318b665a238d7d272125377e786ff
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-projects_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   120176 6d4c7741a3706276da2e67f76ccda644
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-qmailldap_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    23352 8d9360711e849414a9e331b820a06e7e
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-registration_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    29810 c1414f1646c86cc9548cd21091b9402d
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-setup_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   267152 dc7418b235702e20c9c746116a41cd0b
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-sitemgr_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   902332 d18c60e4a310be6a8079659d9edb1ef3
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-skel_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    19062 5c21d71782cb4790f0037ae7358c6366
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-soap_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    23888 001d27f63b54f9a60788b0512f3b0315
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-stocks_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    21842 20bdf757aa0ba7d6e7ddd64454af89c5
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-todo_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    50120 825d4e389401fe8d3ed3cc4f5bad71ed
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-tts_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    55662 7594f3210ebd11e91f483aac7cc9c20b
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-wiki_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    70170 01379389b829ca8fc81f820df5ba0f76
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-xmlrpc_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:    62818 303dbc331b9bdab5e476a6dacfe08a87
    http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.005-3.sarge2_all.deb
      Size/MD5 checksum:   156040 b02eea4ffa8eac66bab0e673df7a5afa


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDGDHkW5ql+IAeqTIRAgjKAJ0ZQXrESKCx66FOz2YV+Rkz0503aQCeLPqe
Jol2uYCvFJbwPaWvi2tinCg=
=lz87
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息

18979
phpGroupWare Main Screen Message Body XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-08-25 2005-07-20
Unknow Unknow

- 解决方案

Upgrade to version 0.9.16.007 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

PHPGroupWare Main Screen Message Script Injection Vulnerability
Input Validation Error 14724
Yes No
2005-08-25 12:00:00 2009-07-12 05:06:00
Announced by the vendor.

- 受影响的程序版本

PHPGroupWare PHPGroupWare 0.9.16 RC3
PHPGroupWare PHPGroupWare 0.9.16 RC2
PHPGroupWare PHPGroupWare 0.9.16 RC1
PHPGroupWare PHPGroupWare 0.9.16 .006
PHPGroupWare PHPGroupWare 0.9.16 .005
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
PHPGroupWare PHPGroupWare 0.9.16 .003
+ Gentoo Linux
PHPGroupWare PHPGroupWare 0.9.16 .002
PHPGroupWare PHPGroupWare 0.9.16 .000
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
PHPGroupWare PHPGroupWare 0.9.16 .007

- 不受影响的程序版本

PHPGroupWare PHPGroupWare 0.9.16 .007

- 漏洞讨论

PHPGroupWare is prone to a script injection vulnerability. A malicious admin user can inject script code into the main screen message of the site.

- 漏洞利用

An exploit is not required.

- 解决方案

Debian has released advisory DSA 798-1 and fixes to address this issue. Please see the referenced advisory for further information.

This issue was addressed in PHPGroupWare 0.9.16.007.


PHPGroupWare PHPGroupWare 0.9.16 .006

PHPGroupWare PHPGroupWare 0.9.16 RC1

PHPGroupWare PHPGroupWare 0.9.16 .005

PHPGroupWare PHPGroupWare 0.9.16 RC3

PHPGroupWare PHPGroupWare 0.9.16 .002

PHPGroupWare PHPGroupWare 0.9.16 .000

PHPGroupWare PHPGroupWare 0.9.16 RC2

PHPGroupWare PHPGroupWare 0.9.16 .003

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站