| Summary: | www-servers/monkeyd : XSS (CVE-2013-2181) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | minor | CC: | blueness |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.openwall.com/lists/oss-security/2013/06/14/3 | ||
| Whiteboard: | B4 [upstream] | ||
| Package list: | Runtime testing required: | --- | |
CVE-2013-2181 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2181): Cross-site scripting (XSS) vulnerability in the Directory Listing plugin in Monkey HTTP Daemon (monkeyd) 1.2.2 allows attackers to inject arbitrary web script or HTML via a file name. Upstream says not a security issue, since it requires filesystem access. Closing INVALID. |
From ${URL} : A vulnerability was found in the Monkey HTTP - dirlisting plugin, which does not filter file names before printing on HTML page, hence vulnerable to XSS attack. PoC ---- $ touch "' onmouseover='alert(1);" Report ------ http://bugs.monkey-project.com/ticket/185 CREDITS ------- Felipe Pena @maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.