Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 123442 - dev-php/adodb: cross site scripting vulnerability
Summary: dev-php/adodb: cross site scripting vulnerability
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://www.gulftech.org/?node=researc...
Whiteboard: B4 [noglsa] DerCorny
Keywords:
Depends on:
Blocks:
 
Reported: 2006-02-19 21:35 UTC by Stefan Cornelius (RETIRED)
Modified: 2009-01-11 19:05 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Cornelius (RETIRED) gentoo-dev 2006-02-19 21:35:52 UTC
There are several Cross Site Scripting issues in ADOdb versions 4.71 and possibly earlier that may allow for an attacker to render malicious client side code in the victim's browser. 
 
if (isset($_GET[$next_page])) {
        $_SESSION[$curr_page] = $_GET[$next_page];
}
if (empty($_SESSION[$curr_page])) $_SESSION[$curr_page] = 1; ## at first page
                
$this->curr_page = $_SESSION[$curr_page];
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2006-02-19 21:36:53 UTC
web-apps team please bump, thx.
Comment 2 Jakub Moc (RETIRED) gentoo-dev 2006-02-20 04:00:50 UTC
Not webapps ;) Also, there's no update available now, 4.71 is still latest version upstream.
Comment 3 Stefan Cornelius (RETIRED) gentoo-dev 2006-02-23 07:50:32 UTC
4.72 seems to be released, http://sourceforge.net/project/showfiles.php?group_id=42718&package_id=34890&release_id=395252
Comment 4 Luca Longinotti (RETIRED) gentoo-dev 2006-02-23 09:27:48 UTC
Thanks for the notification, dev-php/adodb-4.72 is now in the tree.
Best regards, CHTEKK.
Comment 5 Stefan Cornelius (RETIRED) gentoo-dev 2006-02-23 09:30:13 UTC
arches pls test and mark stable, thx
Comment 6 Thierry Carrez (RETIRED) gentoo-dev 2006-02-23 09:56:18 UTC
Stefan, please add arches when setting [stable]
Target KEYWORDS="alpha amd64 ia64 ppc ppc64 ~sparc x86"
Comment 7 Markus Rothe (RETIRED) gentoo-dev 2006-02-23 12:54:12 UTC
stable on ppc64
Comment 8 Mark Loeser (RETIRED) gentoo-dev 2006-02-24 20:23:09 UTC
x86 done
Comment 9 Bryan Østergaard (RETIRED) gentoo-dev 2006-02-26 06:37:03 UTC
Stable on alpha + ia64.
Comment 10 Tobias Scherbaum (RETIRED) gentoo-dev 2006-02-26 10:50:31 UTC
ppc stable
Comment 11 Simon Stelling (RETIRED) gentoo-dev 2006-02-27 11:32:12 UTC
amd64 stable. happy voting!
Comment 12 Stefan Cornelius (RETIRED) gentoo-dev 2006-02-28 08:11:51 UTC
Hehe thx blubb, i tend to say yes
Comment 13 Thierry Carrez (RETIRED) gentoo-dev 2006-03-03 09:50:54 UTC
I tend to say no... Could be convinced otherwise if a major portage package made use of this...
Comment 14 Thierry Carrez (RETIRED) gentoo-dev 2006-03-06 13:37:52 UTC
RDEPs:
dev-php4/adodb-ext-503
dev-php5/adodb-ext-503
net-analyzer/acid-0.9.6_beta23
net-analyzer/acid-0.9.6_beta23-r1
net-analyzer/base-1.2.2
net-analyzer/base-1.2.2-r1
net-www/bugport-1.146

No real XSS victim here, I vote no.
Comment 15 Tavis Ormandy (RETIRED) gentoo-dev 2006-03-06 13:39:34 UTC
agree with Koon, no major target for Xss, voting NO and closing.