Full Disclosure mailing list archives

[ GLSA 200504-24 ] eGroupWare: XSS and SQL injection vulnerabilities


From: Matthias Geerdsen <vorlon () gentoo org>
Date: Mon, 25 Apr 2005 18:30:18 +0200

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200504-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: eGroupWare: XSS and SQL injection vulnerabilities
      Date: April 25, 2005
      Bugs: #89517
        ID: 200504-24

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

eGroupWare is affected by several SQL injection and cross-site
scripting (XSS) vulnerabilities.

Background
==========

eGroupWare is a suite of web-based group applications including
calendar, address book, messenger and email.

Affected packages
=================

    -------------------------------------------------------------------
     Package              /   Vulnerable   /                Unaffected
    -------------------------------------------------------------------
  1  www-apps/egroupware      < 1.0.0.007                 >= 1.0.0.007

Description
===========

Multiple SQL injection and cross-site scripting vulnerabilities have
been found in several eGroupWare modules.

Impact
======

An attacker could possibly use the SQL injection vulnerabilites to gain
information from the database. Furthermore the cross-site scripting
issues give an attacker the ability to inject and execute malicious
script code or to steal cookie based authentication credentials,
potentially compromising the victim's browser.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All eGroupWare users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-apps/egroupware-1.0.0.007"

References
==========

  [ 1 ] GulfTech Security Research Advisory
        http://www.gulftech.org/?node=research&article_id=00069-04202005

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200504-24.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

Attachment: _bin
Description:

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: