📄 deb_1514_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 1514-1 (moin)## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com# Text descriptions are largely excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(60500); script_cve_id("CVE-2007-2423", "CVE-2007-2637", "CVE-2008-0780", "CVE-2008-0781", "CVE-2008-0782", "CVE-2008-1098", "CVE-2008-1099"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 1514-1 (moin)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to moinannounced via advisory DSA 1514-1.Several remote vulnerabilities have been discovered in MoinMoin, aPython clone of WikiWiki. The Common Vulnerabilities and Exposuresproject identifies the following problems:CVE-2007-2423A cross-site-scripting vulnerability has been discovered inattachment handling.CVE-2007-2637Access control lists for calendars and includes wereinsufficiently enforced, which could lead to informationdisclosure.CVE-2008-0780A cross-site-scripting vulnerability has been discovered inthe login code.CVE-2008-0781A cross-site-scripting vulnerability has been discovered inattachment handling.CVE-2008-0782A directory traversal vulnerability in cookie handling couldlead to local denial of service by overwriting files.CVE-2008-1098Cross-site-scripting vulnerabilities have been discovered inthe GUI editor formatter and the code to delete pages.CVE-2008-1099The macro code validates access control lists insufficiently,which could lead to information disclosure.For the stable distribution (etch), these problems have been fixed inversion 1.5.3-1.2etch1. This update also includes a bugfix wrt theencoding of password reminder mails, which doesn't have securityimplications.The old stable distribution (sarge) will not be updated due tothe many changes and support for Sarge ending end of this monthanyway. You're advised to upgrade to the stable distribution ifyou run moinmoin.We recommend that you upgrade your moin package.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201514-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 1514-1 (moin)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"moinmoin-common", ver:"1.5.3-1.2etch1", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"python-moinmoin", ver:"1.5.3-1.2etch1", rls:"DEB4.0")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -