Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 26803 - dev-lang/perl
Summary: dev-lang/perl
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Highest critical (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2003-08-17 06:50 UTC by Daniel Ahlberg (RETIRED)
Modified: 2011-10-30 22:37 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Daniel Ahlberg (RETIRED) gentoo-dev 2003-08-17 06:50:21 UTC
-------------------------------------------------------------------------- 
Debian Security Advisory DSA 371-1                     security@debian.org 
http://www.debian.org/security/                             Matt Zimmerman 
August 11th, 2003                       http://www.debian.org/security/faq 
-------------------------------------------------------------------------- 
 
Package        : perl 
Vulnerability  : cross-site scripting 
Problem-Type   : remote 
Debian-specific: no 
CVE Ids        : CAN-2003-0615 
 
A cross-site scripting vulnerability exists in the start_form() 
function in CGI.pm.  This function outputs user-controlled data into 
the action attribute of a form element without sanitizing it, allowing 
a remote user to execute arbitrary web script within the context of 
the generated page.  Any program which uses this function in the 
CGI.pm module may be affected.
Comment 1 Joshua Kinard gentoo-dev 2003-08-17 14:44:59 UTC
rac already posted a "pre-GLSA" here after I found this isse on Debian's security site.  Emerging the latest CGI.pm ebuild will fix it, versus having everyone recompile the clunker of a package perl can be.

http://forums.gentoo.org/viewtopic.php?t=74904
Comment 2 Michael Cummings (RETIRED) gentoo-dev 2003-08-20 03:00:07 UTC
Please note: This is an additional bug, not covered until CGI-3.0 hit portage a few minutes ago. See bug 26785 for more.
Comment 3 Michael Cummings (RETIRED) gentoo-dev 2003-08-20 03:01:15 UTC
Rac - this is *another* cross-site scripting fix. I've posted CGI-3.0 which covers it. See http://search.cpan.org/src/LDS/CGI.pm-3.00/cgi_docs.html for version summary.
Comment 4 Daniel Ahlberg (RETIRED) gentoo-dev 2003-09-01 07:53:33 UTC
How should this be handled?  I remember we had a similar issue with Safe a 
while ago.  
 
Best would be a new revision of perl that pulls the updated cgi.pm the same 
way as it's done with safe. 
Comment 5 solar (RETIRED) gentoo-dev 2003-12-10 14:54:39 UTC
Re: comment #2 changing resolution to FIXED