You are here
Home > Preporuke > Ranjivost programskog paketa extplorer

Ranjivost programskog paketa extplorer

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-
Debian Security Advisory DSA-2882-1 security@debian.org
http://www.debian.org/security/ Giuseppe Iuculano
March 20, 2014 http://www.debian.org/security/faq
– ————————————————————————-

Package : extplorer
CVE ID : CVE-2013-5951
Debian Bug : 741908

Multiple cross-site scripting (XSS) vulnerabilities have been discovered
in extplorer, a web file explorer and manager using Ext JS.
A remote attackers can inject arbitrary web script or HTML code via a
crafted string in the URL to application.js.php, admin.php, copy_move.php,
functions.php, header.php and upload.php.

For the oldstable distribution (squeeze), this problem has been fixed in
version 2.1.0b6+dfsg.2-1+squeeze2.

For the stable distribution (wheezy), this problem has been fixed in
version 2.1.0b6+dfsg.3-4+deb7u1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your extplorer packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1.4.15 (GNU/Linux)

iEYEARECAAYFAlMrAFkACgkQNxpp46476aorXwCfaVajYfDAGJvnyCE6BbPzPiYP
ZdwAn1yvknfSaW6jm4WQHcJpmP8hzGP1
=MUMv
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140320145105.GA4341@SD6-Casa.iuculano.it

Top
More in Preporuke
Sigurnosni propusti programskog paketa emacs

Otklonjeni su sigurnosni propusti programskog paketa emacs na operacijskom sustavu Gentoo. Prvi propust omogućavao je pokretanje zlonamjernog koda iz neke...

Close