tags 404234 patch moreinfo
thanks

Hi,

> A vulnerability has been found in webcalender:
> 
> Cross-site scripting (XSS) vulnerability in export_handler.php in
> WebCalendar 1.0.4 and earlier allows remote attackers to inject
> arbitrary web script or HTML via the format parameter.

I can see what this is most probably about, and a fix is included in the
attached patch.

Upstream does not have any indication of having this fixed yet.

> I think it would be nice if it was fixed in etch, but I guess one
> could also argue that this is not RC.

I haven't found a concrete way to exploit it yet, since some HTML inputs
are stripped from all input parameters. A concrete example would help to
confirm the status of this bug. Do you have one?


Thijs
--- webcalendar-1.0.4.orig/export_handler.php
+++ webcalendar-1.0.4/export_handler.php
@@ -1016,7 +1016,7 @@
 $format = getValue  ( 'format' );
 if ( $format != 'ical' && $format != 'vcal' && $format != 'pilot-csv' &&
   $format != 'pilot-text' )
-  die_miserable_death ( "Invalid format '" . $format . "'" );
+  die_miserable_death ( "Invalid format '" . htmlspecialchars($format) . "'" );
 
 $use_all_dates = getPostValue  ( 'use_all_dates' );
 if ( $use_all_dates != 'y' )

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to